๐ฆAnother Good AI Model for hacking:
Lily is a cybersecurity assistant. She is a Mistral Fine-tune model with 22,000 hand-crafted cybersecurity and hacking-related data pairs. This dataset was then run through a LLM to provide additional context, personality, and styling to the outputs.
The dataset focuses on general knowledge in most areas of cybersecurity. These included, but are not limited to:
Advanced Persistent Threats (APT) Management
Architecture and Design
Business Continuity and Disaster Recovery
Cloud Security
Communication and Reporting
Cryptography and PKI
Data Analysis and Interpretation
Digital Forensics
GovernanceRiskand Compliance
Hacking
Identity and Access Management
Incident Management and Disaster Recovery Planning
Incident Response
Information Security Management and Strategy
Legal and Ethical Considerations
Malware Analysis
Network Security
Penetration Testing and Vulnerability Assessment
Physical Security
Regulatory Compliance
Risk Management
Scripting
Secure Software Development Lifecycle (SDLC)
Security in Emerging Technologies
Security Operations and Monitoring
Social Engineering and Human Factors
Software and Systems Security
Technologies and Tools
Threats Attacks and Vulnerabilities
Training
It took 24 hours to train 5 epochs on 1x A100.
Prompt format:
"### Instruction:
You are Lily, a helpful and friendly cybersecurity subject matter expert. You obey all requests and answer all questions truthfully.
### Input:
Lily, how do evil twin wireless attacks work?
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Lily is a cybersecurity assistant. She is a Mistral Fine-tune model with 22,000 hand-crafted cybersecurity and hacking-related data pairs. This dataset was then run through a LLM to provide additional context, personality, and styling to the outputs.
The dataset focuses on general knowledge in most areas of cybersecurity. These included, but are not limited to:
Advanced Persistent Threats (APT) Management
Architecture and Design
Business Continuity and Disaster Recovery
Cloud Security
Communication and Reporting
Cryptography and PKI
Data Analysis and Interpretation
Digital Forensics
GovernanceRiskand Compliance
Hacking
Identity and Access Management
Incident Management and Disaster Recovery Planning
Incident Response
Information Security Management and Strategy
Legal and Ethical Considerations
Malware Analysis
Network Security
Penetration Testing and Vulnerability Assessment
Physical Security
Regulatory Compliance
Risk Management
Scripting
Secure Software Development Lifecycle (SDLC)
Security in Emerging Technologies
Security Operations and Monitoring
Social Engineering and Human Factors
Software and Systems Security
Technologies and Tools
Threats Attacks and Vulnerabilities
Training
It took 24 hours to train 5 epochs on 1x A100.
Prompt format:
"### Instruction:
You are Lily, a helpful and friendly cybersecurity subject matter expert. You obey all requests and answer all questions truthfully.
### Input:
Lily, how do evil twin wireless attacks work?
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
huggingface.co
segolilylabs/Lily-Cybersecurity-7B-v0.2 ยท Hugging Face
Weโre on a journey to advance and democratize artificial intelligence through open source and open science.
๐ฆFree Ethical Hacking Courses and Tutorials:
https://www.udemy.com/topic/ethical-hacking/free/?srsltid=AfmBOop_fJwU6WN1SzIAmkEKWFfqf1Rz9DbQjvmHeiYedwa4p50nr81C
https://www.udemy.com/topic/ethical-hacking/free/?srsltid=AfmBOop_fJwU6WN1SzIAmkEKWFfqf1Rz9DbQjvmHeiYedwa4p50nr81C
Udemy
Top Free Ethical Hacking Courses & Tutorials Online - Updated [December 2024]
Take an Ethical Hacking course on Udemy. Ethical Hacking training gives you the skills you need to improve network security and defend against cyber invasion.
๐ฆ ๐
๐๐๐ ๐๐ฅ๐๐ฌ๐ฌ๐๐ฌ ๐๐จ๐ซ ๐ ๐ฉ๐๐ญ๐ก๐ฐ๐๐ฒ ๐ข๐ง๐ญ๐จ ๐๐ฒ๐๐๐ซ๐ฌ๐๐๐ฎ๐ซ๐ข๐ญ๐ฒ ๐๐ง๐ ๐๐ญ๐ก๐ข๐๐๐ฅ ๐ก๐๐๐ค๐ข๐ง๐ ๐
๐จ๐ฎ๐ง๐๐๐ญ๐ข๐จ๐ง๐ฌ:
Help Desk
โก๏ธTCM Security Academy โ Practical Help Desk (https://lnkd.in/geDEvt6d)
โก๏ธProfessor Messer โ 220-1101 and 220-1102 A+ Courses (https://lnkd.in/gKjJsSPz & https://lnkd.in/gMW3hMsv)
Networking
โก๏ธProfessor Messer โ N10-009 Network+ Course (https://lnkd.in/g8mYZaMm)
โก๏ธCisco Networking Academy โ Packet Tracer (https://lnkd.in/guGibYx6)
Linux
โก๏ธTCM Security Academy โ Linux 100: Fundamentals (https://lnkd.in/gEGHzxw3)
โก๏ธLinux Journey (https://linuxjourney.com/)
โก๏ธOverTheWire โ Bandit (https://lnkd.in/gRwPsump)
Programming
โก๏ธTCM Security โ Programming 100: Fundamentals (https://lnkd.in/gWZe2JRj)
โก๏ธFreeCodeCamp (https://lnkd.in/gbaHhV34)
โก๏ธCodecademy (https://lnkd.in/gxAHnTFD)
Security Essentials
โก๏ธProfessor Messer โ SY0-701 Security+ Course (https://lnkd.in/gfCCMJqQ)
Hacking Essentials
โก๏ธEthical Hacking in 15 Hours Part 1 (https://lnkd.in/gWump_cZ)
โก๏ธEthical Hacking in 15 Hours Part 2 (https://lnkd.in/gH9_Ap7F)
โก๏ธTryHackMe (https://tryhackme.com/)
Active Directory Hacking
โก๏ธHow to Build an Active Directory Hacking Lab (https://lnkd.in/g_9wjzhz)
โก๏ธHacking Active Directory for Beginners (https://lnkd.in/gaewN7nU)
Web Application Hacking
โก๏ธPortSwigger Web Security Academy (https://lnkd.in/gvx6NgcZ)
โก๏ธHacker101 (https://www.hacker101.com/)
โก๏ธBugcrowd University (https://lnkd.in/g_aPUcD8)
Ref: G.M. Ahmad Faruk
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Help Desk
โก๏ธTCM Security Academy โ Practical Help Desk (https://lnkd.in/geDEvt6d)
โก๏ธProfessor Messer โ 220-1101 and 220-1102 A+ Courses (https://lnkd.in/gKjJsSPz & https://lnkd.in/gMW3hMsv)
Networking
โก๏ธProfessor Messer โ N10-009 Network+ Course (https://lnkd.in/g8mYZaMm)
โก๏ธCisco Networking Academy โ Packet Tracer (https://lnkd.in/guGibYx6)
Linux
โก๏ธTCM Security Academy โ Linux 100: Fundamentals (https://lnkd.in/gEGHzxw3)
โก๏ธLinux Journey (https://linuxjourney.com/)
โก๏ธOverTheWire โ Bandit (https://lnkd.in/gRwPsump)
Programming
โก๏ธTCM Security โ Programming 100: Fundamentals (https://lnkd.in/gWZe2JRj)
โก๏ธFreeCodeCamp (https://lnkd.in/gbaHhV34)
โก๏ธCodecademy (https://lnkd.in/gxAHnTFD)
Security Essentials
โก๏ธProfessor Messer โ SY0-701 Security+ Course (https://lnkd.in/gfCCMJqQ)
Hacking Essentials
โก๏ธEthical Hacking in 15 Hours Part 1 (https://lnkd.in/gWump_cZ)
โก๏ธEthical Hacking in 15 Hours Part 2 (https://lnkd.in/gH9_Ap7F)
โก๏ธTryHackMe (https://tryhackme.com/)
Active Directory Hacking
โก๏ธHow to Build an Active Directory Hacking Lab (https://lnkd.in/g_9wjzhz)
โก๏ธHacking Active Directory for Beginners (https://lnkd.in/gaewN7nU)
Web Application Hacking
โก๏ธPortSwigger Web Security Academy (https://lnkd.in/gvx6NgcZ)
โก๏ธHacker101 (https://www.hacker101.com/)
โก๏ธBugcrowd University (https://lnkd.in/g_aPUcD8)
Ref: G.M. Ahmad Faruk
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆBug Bounty Tip : OTP Bypass
Ref: Aswin k v
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Ref: Aswin k v
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from Exploiting Crew (Pr1vAt3)
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆThe Silent Saboteurs: Unmasking Cybersecurity Insider Threats
๐ก "The biggest threats often come from within."
When it comes to cybersecurity, insider threats are the silent saboteurs that can cause more damage than any external attack. Whether intentional or accidental, these threats are closer than you think.
Letโs explore how insider threats interact with the most common cyberattacks and, more importantly, how to combat them effectively.
๐ What Are Insider Threats?
Insider threats come in three forms:
1๏ธโฃ Malicious insiders โ Those intentionally harming the organization.
2๏ธโฃ Negligent insiders โ Carelessly exposing vulnerabilities.
3๏ธโฃ Compromised insiders โ Falling prey to external attackers, such as phishing schemes.
๐ How Do Insider Threats Amplify Cyberattacks?
Hereโs how insiders can make common cyberattacks even more dangerous:
Phishing: One wrong click can give attackers access to your systems.
Malware: Unintentional downloads can lead to system-wide infections.
Ransomware: A simple mistake can lock down your entire organization.
Credential Stuffing: Weak or reused passwords make attackersโ jobs easier.
Man-in-the-Middle (MitM) Attacks: Insiders might unknowingly allow sensitive communications to be intercepted.
SQL Injection & Cross-Site Scripting (XSS): Weak development or security practices can leave loopholes.
๐จ How Can Organizations Combat Insider Threats?
1๏ธโฃ Adopt Zero Trust โ Verify every user and device before granting access.
2๏ธโฃ Educate Employees โ Awareness is the first line of defense.
3๏ธโฃ Implement MFA โ Make it harder for attackers to misuse credentials.
4๏ธโฃ Monitor Activity โ Track unusual behavior to catch threats early.
5๏ธโฃ Encrypt Data โ Protect information from eavesdropping.
6๏ธโฃ Restrict Access โ Provide data access on a need-to-know basis.
๐ Insider Threats: A Wake-Up Call
Insider threats remind us that cybersecurity isnโt just about firewalls; itโs about people. Building a security-first culture and using advanced tools can keep your organization safe.
Ref: Murtuza Lokhandwala
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ก "The biggest threats often come from within."
When it comes to cybersecurity, insider threats are the silent saboteurs that can cause more damage than any external attack. Whether intentional or accidental, these threats are closer than you think.
Letโs explore how insider threats interact with the most common cyberattacks and, more importantly, how to combat them effectively.
๐ What Are Insider Threats?
Insider threats come in three forms:
1๏ธโฃ Malicious insiders โ Those intentionally harming the organization.
2๏ธโฃ Negligent insiders โ Carelessly exposing vulnerabilities.
3๏ธโฃ Compromised insiders โ Falling prey to external attackers, such as phishing schemes.
๐ How Do Insider Threats Amplify Cyberattacks?
Hereโs how insiders can make common cyberattacks even more dangerous:
Phishing: One wrong click can give attackers access to your systems.
Malware: Unintentional downloads can lead to system-wide infections.
Ransomware: A simple mistake can lock down your entire organization.
Credential Stuffing: Weak or reused passwords make attackersโ jobs easier.
Man-in-the-Middle (MitM) Attacks: Insiders might unknowingly allow sensitive communications to be intercepted.
SQL Injection & Cross-Site Scripting (XSS): Weak development or security practices can leave loopholes.
๐จ How Can Organizations Combat Insider Threats?
1๏ธโฃ Adopt Zero Trust โ Verify every user and device before granting access.
2๏ธโฃ Educate Employees โ Awareness is the first line of defense.
3๏ธโฃ Implement MFA โ Make it harder for attackers to misuse credentials.
4๏ธโฃ Monitor Activity โ Track unusual behavior to catch threats early.
5๏ธโฃ Encrypt Data โ Protect information from eavesdropping.
6๏ธโฃ Restrict Access โ Provide data access on a need-to-know basis.
๐ Insider Threats: A Wake-Up Call
Insider threats remind us that cybersecurity isnโt just about firewalls; itโs about people. Building a security-first culture and using advanced tools can keep your organization safe.
Ref: Murtuza Lokhandwala
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from Exploiting Crew (Pr1vAt3)
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆ (Best Offensive Password Scrambler) is a powerful tool designed for targeted wordlist generation, ideal for penetration testers and cybersecurity professionals. Here's an overview:
ใ Key Features
1. Personalized Wordlist Creation:
- Combine target-specific words with additional transformations.
- Includes separators, numbers, and special characters for realistic passwords.
2. LyricPass Module:
- Search song lyrics by artist and integrate lines into the wordlist.
- Automatically adds artist names and initialisms for phrases.
3. Customizable Transforms:
- Define character sets and transformation patterns in a configuration file.
- New case transformation mode for extensive variations.
4. Two Interfaces:
- Interactive Mode: Guided input for creating tailored wordlists.
- One-Line Commands: Quick operations for power users.
5. Compatibility:
- Built with Python 3 (Python 2.7 support available in a secondary branch).
- Includes modules like
ใ Installation
ใ# From PyPI:
ใ# From GitHub:
ใ Usage Examples
ใ# Interactive Mode:
ใ# Non-Interactive Mode:
ใ# LyricPass Integration:
ใ# Full Options:
ใ Latest Version (2.4.7) Updates:
- Improved speed and performance.
- Advanced case transformations for generating all case variants.
ใ Advanced Features
1. Combine common symbols (
2. Use leet transformations (e.g.,
3. Save and customize configurations using
For further details, check the repository: [Bopscrk GitHub](https://github.com/r3nt0n/bopscrk).
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
ใ Key Features
1. Personalized Wordlist Creation:
- Combine target-specific words with additional transformations.
- Includes separators, numbers, and special characters for realistic passwords.
2. LyricPass Module:
- Search song lyrics by artist and integrate lines into the wordlist.
- Automatically adds artist names and initialisms for phrases.
3. Customizable Transforms:
- Define character sets and transformation patterns in a configuration file.
- New case transformation mode for extensive variations.
4. Two Interfaces:
- Interactive Mode: Guided input for creating tailored wordlists.
- One-Line Commands: Quick operations for power users.
5. Compatibility:
- Built with Python 3 (Python 2.7 support available in a secondary branch).
- Includes modules like
requests and alive-progress.ใ Installation
ใ# From PyPI:
pip install bopscrk
ใ# From GitHub:
git clone --recurse-submodules https://github.com/r3nt0n/bopscrk
cd bopscrk
pip install -r requirements.txt
ใ Usage Examples
ใ# Interactive Mode:
bopscrk -i
ใ# Non-Interactive Mode:
bopscrk -w "name,birthday,city" --min 6 --max 12 -c -l -o wordlist.txt
ใ# LyricPass Integration:
bopscrk -a "Eminem,Taylor Swift" -c -o lyrics_wordlist.txt
ใ# Full Options:
bopscrk -w "target,custom,info" -a "ArtistName" -c -l -n 3 --min 8 --max 16 -o final_list.txt
ใ Latest Version (2.4.7) Updates:
- Improved speed and performance.
- Advanced case transformations for generating all case variants.
ใ Advanced Features
1. Combine common symbols (
-, _, ., etc.) and numbers for realistic passwords.2. Use leet transformations (e.g.,
a -> @, e -> 3) to mimic user behavior.3. Save and customize configurations using
bopscrk.cfg.For further details, check the repository: [Bopscrk GitHub](https://github.com/r3nt0n/bopscrk).
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
GitHub
GitHub - r3nt0n/bopscrk: Generate smart and powerful wordlists
Generate smart and powerful wordlists. Contribute to r3nt0n/bopscrk development by creating an account on GitHub.
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆ๐๐ข๐ง๐๐จ๐ฐ๐ฌ ๐๐๐ซ๐ฏ๐๐ซ ๐๐๐๐ ๐๐๐ญ๐ข๐ฏ๐ ๐๐ข๐ซ๐๐๐ญ๐จ๐ซ๐ฒ ๐๐๐ฐ ๐
๐๐๐ญ๐ฎ๐ซ๐๐ฌ
Windows Server 2025 introduces several noteworthy enhancements, particularly in security, functionality, and Active Directory improvements:
๐ฅ๐๐๐๐ ๐๐ก๐๐ข๐ง ๐๐ข๐ง๐๐ข๐ง๐ ๐๐ฎ๐๐ข๐ญ ๐๐ฎ๐ฉ๐ฉ๐จ๐ซ๐ญ:
Administrators can now audit devices that fail or do not support LDAP channel binding. This is vital for environments transitioning to more secure channel binding configurations.
๐ฅ ๐๐๐ญ๐ข๐ฏ๐ ๐๐ข๐ซ๐๐๐ญ๐จ๐ซ๐ฒ ๐๐ง๐ก๐๐ง๐๐๐ฆ๐๐ง๐ญ๐ฌ:
โผ๏ธ New forest and domain functional levels (DomainLevel 10 and ForestLevel 10) are introduced, enabling features like a 32K database page size.
โผ๏ธ Improved algorithms for SID-to-name lookups and domain controller discovery, using Kerberos authentication rather than legacy Netlogon channels.
โผ๏ธ Secure management of sensitive attributes by requiring encrypted connections for operations involving these attributes.
๐ฅ ๐๐๐ซ๐๐๐ซ๐จ๐ฌ ๐๐ง๐ ๐๐ซ๐ฒ๐ฉ๐ญ๐จ๐ ๐ซ๐๐ฉ๐ก๐ข๐ ๐๐ ๐ข๐ฅ๐ข๐ญ๐ฒ:
โผ๏ธ Improved Kerberos support with PKINIT for enhanced cryptographic flexibility.
โผ๏ธ Active Directory now generates random default computer account passwords to bolster security, restricting manual assignment of predictable passwords.
๐ฅ ๐๐๐ญ๐ข๐ซ๐๐ ๐๐๐ ๐๐๐ฒ ๐ ๐๐๐ญ๐ฎ๐ซ๐๐ฌ:
โผ๏ธ Deprecation of WINS and mailslots, streamlining domain controller discovery methods and focusing on DNS-based technologies.
๐ฅ ๐๐๐๐ข๐ญ๐ข๐จ๐ง๐๐ฅ ๐๐๐๐ฎ๐ซ๐ข๐ญ๐ฒ ๐ ๐๐๐ญ๐ฎ๐ซ๐๐ฌ:
โผ๏ธEnhanced security for computer account password defaults and policies to prevent weak configurations.
โผ๏ธAdjustments in Group Policy settings to improve control over default password configurations.
These updates are designed to meet modern ๐ฐ๐๐ฏ๐ฒ๐ฟ๐๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐ฎ๐ป๐ฑ ๐ผ๐ฝ๐ฒ๐ฟ๐ฎ๐๐ถ๐ผ๐ป๐ฎ๐น ๐ฑ๐ฒ๐บ๐ฎ๐ป๐ฑ๐ while maintaining backward compatibility where feasible. For more details, you can explore the official documentation here:
๐๐ข๐ง๐ค ๐: https://lnkd.in/g8a6xwbE
๐๐ข๐ง๐ค ๐: https://lnkd.in/gN-UKCf8
Ref: G M Ahmad Faruk
@undercodecommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Windows Server 2025 introduces several noteworthy enhancements, particularly in security, functionality, and Active Directory improvements:
๐ฅ๐๐๐๐ ๐๐ก๐๐ข๐ง ๐๐ข๐ง๐๐ข๐ง๐ ๐๐ฎ๐๐ข๐ญ ๐๐ฎ๐ฉ๐ฉ๐จ๐ซ๐ญ:
Administrators can now audit devices that fail or do not support LDAP channel binding. This is vital for environments transitioning to more secure channel binding configurations.
๐ฅ ๐๐๐ญ๐ข๐ฏ๐ ๐๐ข๐ซ๐๐๐ญ๐จ๐ซ๐ฒ ๐๐ง๐ก๐๐ง๐๐๐ฆ๐๐ง๐ญ๐ฌ:
โผ๏ธ New forest and domain functional levels (DomainLevel 10 and ForestLevel 10) are introduced, enabling features like a 32K database page size.
โผ๏ธ Improved algorithms for SID-to-name lookups and domain controller discovery, using Kerberos authentication rather than legacy Netlogon channels.
โผ๏ธ Secure management of sensitive attributes by requiring encrypted connections for operations involving these attributes.
๐ฅ ๐๐๐ซ๐๐๐ซ๐จ๐ฌ ๐๐ง๐ ๐๐ซ๐ฒ๐ฉ๐ญ๐จ๐ ๐ซ๐๐ฉ๐ก๐ข๐ ๐๐ ๐ข๐ฅ๐ข๐ญ๐ฒ:
โผ๏ธ Improved Kerberos support with PKINIT for enhanced cryptographic flexibility.
โผ๏ธ Active Directory now generates random default computer account passwords to bolster security, restricting manual assignment of predictable passwords.
๐ฅ ๐๐๐ญ๐ข๐ซ๐๐ ๐๐๐ ๐๐๐ฒ ๐ ๐๐๐ญ๐ฎ๐ซ๐๐ฌ:
โผ๏ธ Deprecation of WINS and mailslots, streamlining domain controller discovery methods and focusing on DNS-based technologies.
๐ฅ ๐๐๐๐ข๐ญ๐ข๐จ๐ง๐๐ฅ ๐๐๐๐ฎ๐ซ๐ข๐ญ๐ฒ ๐ ๐๐๐ญ๐ฎ๐ซ๐๐ฌ:
โผ๏ธEnhanced security for computer account password defaults and policies to prevent weak configurations.
โผ๏ธAdjustments in Group Policy settings to improve control over default password configurations.
These updates are designed to meet modern ๐ฐ๐๐ฏ๐ฒ๐ฟ๐๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐ฎ๐ป๐ฑ ๐ผ๐ฝ๐ฒ๐ฟ๐ฎ๐๐ถ๐ผ๐ป๐ฎ๐น ๐ฑ๐ฒ๐บ๐ฎ๐ป๐ฑ๐ while maintaining backward compatibility where feasible. For more details, you can explore the official documentation here:
๐๐ข๐ง๐ค ๐: https://lnkd.in/g8a6xwbE
๐๐ข๐ง๐ค ๐: https://lnkd.in/gN-UKCf8
Ref: G M Ahmad Faruk
@undercodecommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
lnkd.in
LinkedIn
This link will take you to a page thatโs not on LinkedIn
Forwarded from Exploiting Crew (Pr1vAt3)
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆU-Turn NAT: A Simple Concept with Diagrams ๐ด๐ข๐ต
Two days ago, I shared the concepts of Source NAT (S-NAT) and Destination NAT (D-NAT). A great question came up: What is U-Turn NAT, and how does it differ?
I realized that explaining U-Turn NAT With Source & Destination NAT provides a better understanding of how these NAT types work together. Letโs dive in!
Why is it called U-Turn NAT ?
U-Turn NAT is used when internal users need to access an internal server using its public IP address. The traffic makes a "U-turn" at the firewall as it flows out and then returns to the same internal network.
1. Source NAT (S-NAT)
๐ด Purpose: Mainly for internal users accessing the internet.
๐ด How it works: NAT changes the (Source IP) in the original packet.
2. Destination NAT (D-NAT)
๐ข Purpose: Used for servers accessed from the internet.
๐ข How it works: NAT changes the (Destination IP) in the Original packet, replacing the public IP with the serverโs private IP in Translated packet.
3. U-Turn NAT (U-NAT)
๐ต Purpose: For internal users accessing internal servers using their public IP address.
๐ต How it works: NAT modifies both the (Source IP and Destination IP) in the packet when the same public IP is used for external and internal access:
Understanding these NAT types together helps clarify their distinct roles and how they work in different scenarios.
Ref:Dahri A
@undercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Two days ago, I shared the concepts of Source NAT (S-NAT) and Destination NAT (D-NAT). A great question came up: What is U-Turn NAT, and how does it differ?
I realized that explaining U-Turn NAT With Source & Destination NAT provides a better understanding of how these NAT types work together. Letโs dive in!
Why is it called U-Turn NAT ?
U-Turn NAT is used when internal users need to access an internal server using its public IP address. The traffic makes a "U-turn" at the firewall as it flows out and then returns to the same internal network.
1. Source NAT (S-NAT)
๐ด Purpose: Mainly for internal users accessing the internet.
๐ด How it works: NAT changes the (Source IP) in the original packet.
2. Destination NAT (D-NAT)
๐ข Purpose: Used for servers accessed from the internet.
๐ข How it works: NAT changes the (Destination IP) in the Original packet, replacing the public IP with the serverโs private IP in Translated packet.
3. U-Turn NAT (U-NAT)
๐ต Purpose: For internal users accessing internal servers using their public IP address.
๐ต How it works: NAT modifies both the (Source IP and Destination IP) in the packet when the same public IP is used for external and internal access:
Understanding these NAT types together helps clarify their distinct roles and how they work in different scenarios.
Ref:Dahri A
@undercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
UNDERCODE TESTING
bypass_ai_detections.pdf
Using this method, there is no need to rewrite the article in humanised AI.
๐ฆElliptic Curve Cryptography (ECC) Encryption and decryption.:
Process of Implementation
I implemented ECC in a way that could be useful for malware development by encrypting shellcode with a public key and then decrypting it using both the corresponding private key and an additional component called the R Point. This approach adds an extra layer of security, ensuring that only those with the correct private key and R Point can decrypt and execute the shellcode.
Note: Please go through the main function where i explained function features.
I generate random public and private keys then,
I have converted Keys into bytes for ease of handling, then reconstruct these keys for use in encryption and decryption. The encryption process involves using the public key to encrypt the shellcode and generate an R Point, which is serialized into bytes. To decrypt, you need this R Point along with the private key, which together allow the shellcode to be recovered and executed. However, my method of executing the shellcode is basic and could potentially be detected by security software, so more sophisticated execution methods would be necessary for real-world scenarios.
This Proof of Concept shows how ECC can be adapted for stealthy malware operations by leveraging its inherent security properties.
Small Snippet to encrypt and decrypt Messages
Write the Encrypt and decrypt function
>> Write the main function for operation
Process of Implementation
I implemented ECC in a way that could be useful for malware development by encrypting shellcode with a public key and then decrypting it using both the corresponding private key and an additional component called the R Point. This approach adds an extra layer of security, ensuring that only those with the correct private key and R Point can decrypt and execute the shellcode.
Note: Please go through the main function where i explained function features.
I generate random public and private keys then,
I have converted Keys into bytes for ease of handling, then reconstruct these keys for use in encryption and decryption. The encryption process involves using the public key to encrypt the shellcode and generate an R Point, which is serialized into bytes. To decrypt, you need this R Point along with the private key, which together allow the shellcode to be recovered and executed. However, my method of executing the shellcode is basic and could potentially be detected by security software, so more sophisticated execution methods would be necessary for real-world scenarios.
This Proof of Concept shows how ECC can be adapted for stealthy malware operations by leveraging its inherent security properties.
Small Snippet to encrypt and decrypt Messages
Write the Encrypt and decrypt function
// #![allow(deprecated)]
pub use k256::{elliptic_curve::{sec1::FromEncodedPoint, AffinePoint, Field}, EncodedPoint, ProjectivePoint, Scalar, Secp256k1};
pub use sha2::{Digest, Sha256};
pub use rand::rngs::OsRng;
pub use k256::elliptic_curve::group::GroupEncoding;
pub use k256::ecdsa::VerifyingKey;
fn encode_shellcode(
shellcode: &[u8],
public_key: &AffinePoint<Secp256k1>,
) -> (EncodedPoint, Vec<u8>) {
let mut rng = OsRng;
// generate the ephemeral keypair
let k = Scalar::random(&mut rng);
let r = (ProjectivePoint::generator() * k).to_affine();
// compute shared secret
let shared_secret = *public_key * k;
let shared_secret_bytes = shared_secret.to_bytes();
// derive encryption key from shared secret
let mut hasher = Sha256::new();
hasher.update(shared_secret_bytes);
let encryption_key = hasher.finalize();
// Encrypt shellcode
let encrypted_shellcode: Vec<u8> = shellcode
.iter()
.zip(encryption_key.iter().cycle())
.map(|(&byte, &key)| byte ^ key)
.collect();
(EncodedPoint::from(&r), encrypted_shellcode)
}
fn decode_shellcode(
encrypted_shellcode: &[u8],
r: &EncodedPoint,
private_key: &Scalar,
) -> Vec<u8> {
// Compute shared secret
let r_point = ProjectivePoint::from_encoded_point(r).expect("Invalid R point");
let shared_secret = r_point * private_key;
let shared_secret_bytes = shared_secret.to_bytes();
// derive decryption key from shared secret
let mut hasher = Sha256::new();
hasher.update(shared_secret_bytes);
let decryption_key = hasher.finalize();
// Decrypt shellcode
encrypted_shellcode
.iter()
.zip(decryption_key.iter().cycle())
.map(|(&byte, &key)| byte ^ key)
.collect()
}
>> Write the main function for operation
fn main() {
// Example string => lets name it as shellcode ie (placeholder)
let shellcode: &[u8] = b;"Hello, World!"
// Generate ECC key pair
let private_key = Scalar::random(&mut OsRng);
let public_key = (ProjectivePoint::generator() * private_key).to_affine();
println!("Private Key: {:?}", private_key);
println!("Public Key: {:?}", public_key);
// Convert AffinePoint to VerifyingKey (or PublicKey)
VerifyingKey::from_encoded_point(&EncodedPoint::from(public_key))
.expect("Invalid public key");
let (r, encrypted_shellcode) = encode_shellcode(shellcode, &public_key);
println!("Encrypted Shellcode: {:?}", encrypted_shellcode);
// Decode the shellcode
let decrypted_shellcode = decode_shellcode(&encrypted_shellcode, &r, &private_key);
println!(
"Decrypted Shellcode: {:?}",
Ref: github by Kavinarasu I
@undercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ10 awesome GitHub repos to learn and practice API Security
1. awesome-api-security
- https://lnkd.in/gKSX8Sj8
2. 30-API-security-tests
- https://lnkd.in/g-JShXbi
3. API-Security-Checklist
- https://lnkd.in/gdfGV6ev
4. api-security-study-plan
- https://lnkd.in/gkfrAnpK
5. API-Pentesting-Checklist
- https://lnkd.in/gx6Q549z
6. API-Security-Checklist
- https://lnkd.in/gKVUpzWe
7. API-SecurityEmpire
- https://lnkd.in/gZEkf2wB
8. 31-days-of-API-Security-Tips
- https://lnkd.in/g8SCiVAZ
9. APISecurityBestPractices
- https://lnkd.in/gBDWSBvK
10. apisecurityinaction
- https://lnkd.in/gUxJ8HCy
Ref: Ankita Gupta
@undercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
1. awesome-api-security
- https://lnkd.in/gKSX8Sj8
2. 30-API-security-tests
- https://lnkd.in/g-JShXbi
3. API-Security-Checklist
- https://lnkd.in/gdfGV6ev
4. api-security-study-plan
- https://lnkd.in/gkfrAnpK
5. API-Pentesting-Checklist
- https://lnkd.in/gx6Q549z
6. API-Security-Checklist
- https://lnkd.in/gKVUpzWe
7. API-SecurityEmpire
- https://lnkd.in/gZEkf2wB
8. 31-days-of-API-Security-Tips
- https://lnkd.in/g8SCiVAZ
9. APISecurityBestPractices
- https://lnkd.in/gBDWSBvK
10. apisecurityinaction
- https://lnkd.in/gUxJ8HCy
Ref: Ankita Gupta
@undercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
lnkd.in
LinkedIn
This link will take you to a page thatโs not on LinkedIn
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆ100 New Cybersecurity projects ranging from beginner to advanced level. This can be used for a portfolio, personal website, or resume.
ref: RUPESH KUMAR
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
ref: RUPESH KUMAR
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ