Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆ1)15 vulnerabilities in one public bbp
https://lnkd.in/ggi4T39C
2)How I got access to Credentials easily
https://lnkd.in/gcnNE8hs
3)Bug Bounty Tips Series: 10 Ways To Find HTTP Host Header Injection Vulnerability
https://lnkd.in/gnji_rts
4)๐จ Cisco Warns of Attacks Exploiting Decade-Old ASA Vulnerability ๐จ
https://lnkd.in/gNHZMnXY
5)Exploiting and Remediating Access Control Vulnerabilities
https://lnkd.in/gasczeCV
6)20 Bug Bounty CrowdSourced Platforms
https://lnkd.in/g24uCdbQ
7)The Ninja Hacker Academy - A full guide to your graduation
https://lnkd.in/g86dxzSQ
8)Lookup โ TryHackMe CTF Writeup {FOR BEGINNERS}
https://lnkd.in/gK9Vd6_i
9)TRYHACKME : Dav
https://lnkd.in/ggpStJn2
10)CTFs Network Section Walkthrough
https://lnkd.in/gC79pVfS
Ref: Saumadip MandalSaumadip Mandal
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
https://lnkd.in/ggi4T39C
2)How I got access to Credentials easily
https://lnkd.in/gcnNE8hs
3)Bug Bounty Tips Series: 10 Ways To Find HTTP Host Header Injection Vulnerability
https://lnkd.in/gnji_rts
4)๐จ Cisco Warns of Attacks Exploiting Decade-Old ASA Vulnerability ๐จ
https://lnkd.in/gNHZMnXY
5)Exploiting and Remediating Access Control Vulnerabilities
https://lnkd.in/gasczeCV
6)20 Bug Bounty CrowdSourced Platforms
https://lnkd.in/g24uCdbQ
7)The Ninja Hacker Academy - A full guide to your graduation
https://lnkd.in/g86dxzSQ
8)Lookup โ TryHackMe CTF Writeup {FOR BEGINNERS}
https://lnkd.in/gK9Vd6_i
9)TRYHACKME : Dav
https://lnkd.in/ggpStJn2
10)CTFs Network Section Walkthrough
https://lnkd.in/gC79pVfS
Ref: Saumadip MandalSaumadip Mandal
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
lnkd.in
LinkedIn
This link will take you to a page thatโs not on LinkedIn
Forwarded from Exploiting Crew (Pr1vAt3)
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆANDROID PIN CRACKING - Live Video Demonstration
1๏ธโฃThe attack leverages a physical Rubber Ducky device, which exploits the Human Interface Device (HID) protocol to emulate keyboard input. By employing a brute-force approach, the device systematically attempts PIN combinations from 0000 to 9999, saving the correct PIN upon successful authentication. To mitigate detection mechanisms, the attack is designed to halt after five unsuccessful attempts and a 30-minute timeout. Furthermore, the device's configuration and scripting capabilities can be tailored to specific target devices.
> Beyond PIN cracking, the #RubberDucky can be programmed to enable USB debugging, opening the door to a wider range of potential attacks. This includes reverse shell connections, binding shell sessions, and camera exploitation, ultimately exposing the device to data leakage and other security risks.
โHere is a working Proof of concept of the latest attack discovered by me that exploits Android Smartphones working on the latest version of Android and the latest security patches that can break Android PIN (4-digit PIN and 6-digit PIN) tested on 20 brands including the Google Pixel series and OnePlus devices. The demonstration can crack PIN patterns and also the PIN that is required before the device is turned on. The device is a rubber ducky that uses an HID exploit that can work like a keyboard and use brute force attack i.e. trying PIN from 0000 to 9999 and also saving the PIN once unlocked. The device is configured to work with a timeout of 30 minutes after 5 attempts and the scripts can be configured based on the device we are working on. It can store 5MB of Python Script which is executed after the Arduino firmware is complete. It works on ATMega chipset and allows the user to also enable USB debugging which can further enable other attacks like reverse shell and binding connections exposing users to Camera exploits and even data leaks.
Ref: Priyank Gada
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
This document presents a functional Proof-of-Concept (PoC) for a novel attack vector targeting #Android #smartphones running the latest Android version and #security patches. This attack has been successfully validated on over 20 popular brands, including Google Pixel and OnePlus devices. The PoC demonstrates the ability to compromise both standard 4-digit and 6-digit PINs, as well as pattern locks and PINs required for device boot-up.
1๏ธโฃThe attack leverages a physical Rubber Ducky device, which exploits the Human Interface Device (HID) protocol to emulate keyboard input. By employing a brute-force approach, the device systematically attempts PIN combinations from 0000 to 9999, saving the correct PIN upon successful authentication. To mitigate detection mechanisms, the attack is designed to halt after five unsuccessful attempts and a 30-minute timeout. Furthermore, the device's configuration and scripting capabilities can be tailored to specific target devices.
> Beyond PIN cracking, the #RubberDucky can be programmed to enable USB debugging, opening the door to a wider range of potential attacks. This includes reverse shell connections, binding shell sessions, and camera exploitation, ultimately exposing the device to data leakage and other security risks.
โHere is a working Proof of concept of the latest attack discovered by me that exploits Android Smartphones working on the latest version of Android and the latest security patches that can break Android PIN (4-digit PIN and 6-digit PIN) tested on 20 brands including the Google Pixel series and OnePlus devices. The demonstration can crack PIN patterns and also the PIN that is required before the device is turned on. The device is a rubber ducky that uses an HID exploit that can work like a keyboard and use brute force attack i.e. trying PIN from 0000 to 9999 and also saving the PIN once unlocked. The device is configured to work with a timeout of 30 minutes after 5 attempts and the scripts can be configured based on the device we are working on. It can store 5MB of Python Script which is executed after the Arduino firmware is complete. It works on ATMega chipset and allows the user to also enable USB debugging which can further enable other attacks like reverse shell and binding connections exposing users to Camera exploits and even data leaks.
Ref: Priyank Gada
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆFree Certificated Courses:
Cisco is Offering FREE Cyber Security Courses + official Badges!
Start Your Cybersecurity Career with these in demand courses!
โญ1. Introduction to Cybersecurity
- Course Duration: 6 HOURS
- Level: BEGINNER
- Lab: 7 LABS
- Delivery Type: SELF-PACED
Course Link: https://lnkd.in/eh5MTBwT
โญ2. Cyber Threat Management
- Course Duration: 16 HOURS
- Level: INTERMEDIATE
- Lab: 16 LABS
- Delivery Type: SELF-PACED
Course Link: https://lnkd.in/ehwb_Hsh
โญ3. Endpoint Security
- Course Duration: 27 HOURS
- Level: Intermediate
- Labs: 31 LABS
- Delivery Type: SELF-PACED
Course Link: https://lnkd.in/eV2UB7xy
โญ4. Network Defense
- Course Duration: 27 HOURS
- Level: INTERMEDIATE
- Lab: 29 LABS
- Delivery Type: SELF-PACED
Course Link: https://lnkd.in/ekTpuvyn
Ref: Mohamed Ali Mohamed
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Cisco is Offering FREE Cyber Security Courses + official Badges!
Start Your Cybersecurity Career with these in demand courses!
โญ1. Introduction to Cybersecurity
- Course Duration: 6 HOURS
- Level: BEGINNER
- Lab: 7 LABS
- Delivery Type: SELF-PACED
Course Link: https://lnkd.in/eh5MTBwT
โญ2. Cyber Threat Management
- Course Duration: 16 HOURS
- Level: INTERMEDIATE
- Lab: 16 LABS
- Delivery Type: SELF-PACED
Course Link: https://lnkd.in/ehwb_Hsh
โญ3. Endpoint Security
- Course Duration: 27 HOURS
- Level: Intermediate
- Labs: 31 LABS
- Delivery Type: SELF-PACED
Course Link: https://lnkd.in/eV2UB7xy
โญ4. Network Defense
- Course Duration: 27 HOURS
- Level: INTERMEDIATE
- Lab: 29 LABS
- Delivery Type: SELF-PACED
Course Link: https://lnkd.in/ekTpuvyn
Ref: Mohamed Ali Mohamed
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
lnkd.in
LinkedIn
This link will take you to a page thatโs not on LinkedIn
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆFree ๐ฉ๐๐น๐ป๐ฒ๐ฟ๐ฎ๐ฏ๐ถ๐น๐ถ๐๐ ๐ ๐ฎ๐ป๐ฎ๐ด๐ฒ๐บ๐ฒ๐ป๐, ๐ฆ๐ฐ๐ฎ๐ป๐ป๐ถ๐ป๐ด ๐ง๐ผ๐ผ๐น๐ ๐ฎ๐ป๐ฑ ๐ง๐ฟ๐ฎ๐ถ๐ป๐ถ๐ป๐ด๐ ๐ฎ๐ฌ๐ฎ๐ฐ ๐ต๏ธ Vulnerability management is important in cybersecurity as it helps reduce risk, maintain compliance, protect assets, enable proactive defense, manage reputation, and achieve cost savings. Here's a curated list of resources I prepared to help you delve deeper into this topic.
โ ๐ญ. Vulnerability management: https://lnkd.in/e_GaRhWZ
Checklist:
ใ https:://DailyCVE.com (AI powered Checker & Analysis)โ
https://lnkd.in/eyM7VJEs โญ VM 101 by CrowdStrike: https://lnkd.in/e_HY3Z_J
Vulnerability Assessment 101: https://lnkd.in/eRkz-hMe
Vulnerability Scanning Tools: https://lnkd.in/gbKnkgdt
OWASP Vulnerability Management Guide: https: //lnkd.in/ebEB4HHa
SANS VM Resources: https://lnkd.in/ePGveFcd
โ ๐ฎ. ๐๐ฟ๐ฒ๐ฒ๐ป๐ฏ๐ผ๐ป๐ฒ ๐ข๐ฝ๐ฒ๐ป๐ฉ๐๐ฆ Download Link: https://www.openvas.org/
Installation Guide: https://lnkd.in/eFB78JTQ
โ ๐ฏ. ๐ง๐ฒ๐ป๐ฎ๐ฏ๐น๐ฒ ๐ก๐ฒ๐๐๐๐ ๐๐๐๐ฒ๐ป๐๐ถ๐ฎ๐น๐ Download Link: https://lnkd.in/gzNsE_kW
Tenable University: https://lnkd.in/dt9t4iVs
Training: https://lnkd.in/gQEUxFeu
โ ๐ฐ. ๐ค๐๐ฎ๐น๐๐ Link: https://lnkd.in/ezytw_UB
Training: https://lnkd.in/gvNKJnni
VM for Dummies eBook : https://lnkd.in/e2ed9XxS
โ ๐ฑ. ๐ฅ๐ฎ๐ฝ๐ถ๐ฑ ๐ณ ๐๐ป๐๐ถ๐ด๐ต๐๐ฉ๐ Vulnerability Management Process : https://lnkd.in/eCe5RHtR โญ Nexpose Link: https://lnkd.in/gdARCttE
InsightVM Link: https://lnkd.in/gCtiQgyA
Training: https://lnkd.in/g3Q5i6fT
โ ๐ฒ. ๐๐ด๐ฒ๐ป๐๐น๐ฒ๐๐ ๐ฉ๐๐น๐ป๐ฒ๐ฟ๐ฎ๐ฏ๐ถ๐น๐ถ๐๐ ๐ฆ๐ฐ๐ฎ๐ป๐ป๐ฒ๐ฟ ๐ณ๐ผ๐ฟ ๐๐ถ๐ป๐๐ /๐๐ฟ๐ฒ๐ฒ๐๐ฆ๐: https://vuls.io/
โ ๐ณ. ๐ฉ๐๐น๐ป๐ฒ๐ฟ๐ฎ๐ฏ๐ถ๐น๐ถ๐๐ ๐๐ฎ๐๐ฎ๐ฏ๐ฎ๐๐ฒ / ๐๐ฎ๐๐ฎ ๐๐ผ๐๐ฟ๐ฐ๐ฒ National Vulnerability Database: https://nvd.nist.gov/
Full Listing: https://lnkd.in/gSNNgY9W
Top-50-vendors: https://lnkd.in/eTqY7bxG
CVE Details: https://lnkd.in/gXm_2Z5h
CVE Report: https://cve.report/
Miter CVE: https://cve.mitre.org/
Miter CWE: https://cwe.mitre.org/
Exploit Prediction Scoring System (EPSS): https://lnkd.in/e3EndP-3
Vulnerability search: https://vulners.com/
Vulnerability database: https://vuldb.com/
Known Exploited Vulnerabilities:https://lnkd.in/gHAFJEtS
Cyberscan : https://lnkd.in/eRS6W_w3
โ ๐ด. ๐๐ฉ๐ฆ๐ฆ ๐๐ฎ๐น๐ฐ๐๐น๐ฎ๐๐ผ๐ฟ V3 Link: https://lnkd.in/gNqYyqKx
V4 Link: https://lnkd.in/eRd_ggVT
โ ๐ต. ๐๐๐ด ๐๐ผ๐๐ป๐๐ ๐ฃ๐ฟ๐ผ๐ด๐ฟ๐ฎ๐บ๐: find vulnerability and get paid - https://lnkd.in/esUdfjD9
Mozilla Observatory: https://lnkd.in/e7AbJDEh
The Mozilla Observatory has helped over 240,000 websites by teaching developers, system administrators, and security professionals how to configure their sites safely and securely. Source: https://lnkd.in/emMQ- Zhm
Ref: Mohamad Hamadi
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ ๐ญ. Vulnerability management: https://lnkd.in/e_GaRhWZ
Checklist:
ใ https:://DailyCVE.com (AI powered Checker & Analysis)โ
https://lnkd.in/eyM7VJEs โญ VM 101 by CrowdStrike: https://lnkd.in/e_HY3Z_J
Vulnerability Assessment 101: https://lnkd.in/eRkz-hMe
Vulnerability Scanning Tools: https://lnkd.in/gbKnkgdt
OWASP Vulnerability Management Guide: https: //lnkd.in/ebEB4HHa
SANS VM Resources: https://lnkd.in/ePGveFcd
โ ๐ฎ. ๐๐ฟ๐ฒ๐ฒ๐ป๐ฏ๐ผ๐ป๐ฒ ๐ข๐ฝ๐ฒ๐ป๐ฉ๐๐ฆ Download Link: https://www.openvas.org/
Installation Guide: https://lnkd.in/eFB78JTQ
โ ๐ฏ. ๐ง๐ฒ๐ป๐ฎ๐ฏ๐น๐ฒ ๐ก๐ฒ๐๐๐๐ ๐๐๐๐ฒ๐ป๐๐ถ๐ฎ๐น๐ Download Link: https://lnkd.in/gzNsE_kW
Tenable University: https://lnkd.in/dt9t4iVs
Training: https://lnkd.in/gQEUxFeu
โ ๐ฐ. ๐ค๐๐ฎ๐น๐๐ Link: https://lnkd.in/ezytw_UB
Training: https://lnkd.in/gvNKJnni
VM for Dummies eBook : https://lnkd.in/e2ed9XxS
โ ๐ฑ. ๐ฅ๐ฎ๐ฝ๐ถ๐ฑ ๐ณ ๐๐ป๐๐ถ๐ด๐ต๐๐ฉ๐ Vulnerability Management Process : https://lnkd.in/eCe5RHtR โญ Nexpose Link: https://lnkd.in/gdARCttE
InsightVM Link: https://lnkd.in/gCtiQgyA
Training: https://lnkd.in/g3Q5i6fT
โ ๐ฒ. ๐๐ด๐ฒ๐ป๐๐น๐ฒ๐๐ ๐ฉ๐๐น๐ป๐ฒ๐ฟ๐ฎ๐ฏ๐ถ๐น๐ถ๐๐ ๐ฆ๐ฐ๐ฎ๐ป๐ป๐ฒ๐ฟ ๐ณ๐ผ๐ฟ ๐๐ถ๐ป๐๐ /๐๐ฟ๐ฒ๐ฒ๐๐ฆ๐: https://vuls.io/
โ ๐ณ. ๐ฉ๐๐น๐ป๐ฒ๐ฟ๐ฎ๐ฏ๐ถ๐น๐ถ๐๐ ๐๐ฎ๐๐ฎ๐ฏ๐ฎ๐๐ฒ / ๐๐ฎ๐๐ฎ ๐๐ผ๐๐ฟ๐ฐ๐ฒ National Vulnerability Database: https://nvd.nist.gov/
Full Listing: https://lnkd.in/gSNNgY9W
Top-50-vendors: https://lnkd.in/eTqY7bxG
CVE Details: https://lnkd.in/gXm_2Z5h
CVE Report: https://cve.report/
Miter CVE: https://cve.mitre.org/
Miter CWE: https://cwe.mitre.org/
Exploit Prediction Scoring System (EPSS): https://lnkd.in/e3EndP-3
Vulnerability search: https://vulners.com/
Vulnerability database: https://vuldb.com/
Known Exploited Vulnerabilities:https://lnkd.in/gHAFJEtS
Cyberscan : https://lnkd.in/eRS6W_w3
โ ๐ด. ๐๐ฉ๐ฆ๐ฆ ๐๐ฎ๐น๐ฐ๐๐น๐ฎ๐๐ผ๐ฟ V3 Link: https://lnkd.in/gNqYyqKx
V4 Link: https://lnkd.in/eRd_ggVT
โ ๐ต. ๐๐๐ด ๐๐ผ๐๐ป๐๐ ๐ฃ๐ฟ๐ผ๐ด๐ฟ๐ฎ๐บ๐: find vulnerability and get paid - https://lnkd.in/esUdfjD9
Mozilla Observatory: https://lnkd.in/e7AbJDEh
The Mozilla Observatory has helped over 240,000 websites by teaching developers, system administrators, and security professionals how to configure their sites safely and securely. Source: https://lnkd.in/emMQ- Zhm
Ref: Mohamad Hamadi
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from Exploiting Crew (Pr1vAt3)
Media is too big
VIEW IN TELEGRAM
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆWindows Defender Bypass 2024 with AES-Encrypted Malicious DLL.
Hello everyone,
Since a lot of you guys enjoyed the last video, I decided to create another bypass techniqueโthis time using AES encryption for the shellcode. To make it more interesting, I incorporated the shellcode into a malicious DLL and executed it using another process.
Hereโs how it works:
I created a simple file, test.exe (the process I mentioned), which loads the malicious DLL containing the encrypted shellcode. This is achieved using the LoadLibraryA() function and the GetProcAddress() function which is essential for loading any DLL and their exported functions into a process's memory. Once loaded, the DLL decrypts and executes the shellcode.
This time malicious DLL contained raw encrypted shellcode stored on disk. The encryption prevents detection by Windows Defender. In my previous approach, the shellcode was hosted on a server, making it a staged payload. While experimenting, I also tried XOR to obfuscate the shellcode like last time. However, it was consistently detected for some reason I still donโt understand.XORing the shellcode and AES encrypting it share a similar concept though.I might be wrong on this one, forgive me if I am.
This method can be implemented in various ways. One approach is to inject the DLL into another process using its PID or using this AES method to just execute the malicious exe to run the shellcode in memory without loading the dll. This technique has been used by APTs as a means of achieving persistence on compromised systems they target.
I used multiple resources from the internet. All the code used do not belong to me. I added custom logic(like calling the exported function) and tweaked it a little bit to make it work like the way I wanted it to. I give credit to the internet.Hope you guys find this useful!
Ref: Dhanush Arvind
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Hello everyone,
Since a lot of you guys enjoyed the last video, I decided to create another bypass techniqueโthis time using AES encryption for the shellcode. To make it more interesting, I incorporated the shellcode into a malicious DLL and executed it using another process.
Hereโs how it works:
I created a simple file, test.exe (the process I mentioned), which loads the malicious DLL containing the encrypted shellcode. This is achieved using the LoadLibraryA() function and the GetProcAddress() function which is essential for loading any DLL and their exported functions into a process's memory. Once loaded, the DLL decrypts and executes the shellcode.
This time malicious DLL contained raw encrypted shellcode stored on disk. The encryption prevents detection by Windows Defender. In my previous approach, the shellcode was hosted on a server, making it a staged payload. While experimenting, I also tried XOR to obfuscate the shellcode like last time. However, it was consistently detected for some reason I still donโt understand.XORing the shellcode and AES encrypting it share a similar concept though.I might be wrong on this one, forgive me if I am.
This method can be implemented in various ways. One approach is to inject the DLL into another process using its PID or using this AES method to just execute the malicious exe to run the shellcode in memory without loading the dll. This technique has been used by APTs as a means of achieving persistence on compromised systems they target.
I used multiple resources from the internet. All the code used do not belong to me. I added custom logic(like calling the exported function) and tweaked it a little bit to make it work like the way I wanted it to. I give credit to the internet.Hope you guys find this useful!
Ref: Dhanush Arvind
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆ๐๐๐ ๐๐ก๐ซ๐จ๐ฎ๐ ๐ก ๐๐๐๐
๐๐๐๐ฌ ๐
I often see applications that let their users control URLs which are reflected back in the DOM as part of the HREF tag
Most of the time these features let you:
โข set the integration URL with a 3rd party service
โข customize your profile page with a link to your own blog/website
โข link your account to you social media profile
While sometimes developers use HTML encoding on quotes to block attackers from escaping the tag, there are several ways to trigger XSS inside href tags <without> escaping them.
One of them is to provide a valid URL format (to bypass server-side validation) but use the javascript protocol (instead of http which is what most developers would expect)
Note however that this won't work if the target="_blank" is specified
Ref: Andrei Agape
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
I often see applications that let their users control URLs which are reflected back in the DOM as part of the HREF tag
Most of the time these features let you:
โข set the integration URL with a 3rd party service
โข customize your profile page with a link to your own blog/website
โข link your account to you social media profile
While sometimes developers use HTML encoding on quotes to block attackers from escaping the tag, there are several ways to trigger XSS inside href tags <without> escaping them.
One of them is to provide a valid URL format (to bypass server-side validation) but use the javascript protocol (instead of http which is what most developers would expect)
Note however that this won't work if the target="_blank" is specified
Ref: Andrei Agape
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆ
๐ญ. ๐๐ผ๐ฐ๐๐ ๐ผ๐ป ๐๐ฒ๐ฝ๐๐ต ๐ผ๐๐ฒ๐ฟ ๐๐ฟ๐ฒ๐ฎ๐ฑ๐๐ต:
- Don't solve 500 coding problems aimlessly. Master around 100 core problems deeply instead.
- 40 Problems on Array, Strings, LinkedList, Stack & Queue, Binary search, Trees, Graph, Sorting and Searching: https://lnkd.in/djnaPkeD
- 40 Problems on Dynamic Programming (DP), Backtracking, Hashing, Heap, Tries, and Greedy Algorithms: https://lnkd.in/dF3h-Khk
๐ฎ. ๐๐ฟ๐ฒ๐ฎ๐๐ฒ ๐ฎ ๐น๐ถ๐๐ ๐ผ๐ณ ๐ธ๐ฒ๐ ๐พ๐๐ฒ๐๐๐ถ๐ผ๐ป๐:
- Use resources like "Strivers A2Z DSA Sheet" by Raj Vikramaditya to curate around 100 core problems.
- https://lnkd.in/dQMGy9zF (Strivers)
๐ฏ. ๐ ๐ฎ๐๐๐ฒ๐ฟ ๐ฒ๐ฎ๐ฐ๐ต ๐ฑ๐ฎ๐๐ฎ ๐๐๐ฟ๐๐ฐ๐๐๐ฟ๐ฒ:
- Understand and implement them by hand. Know how they work internally to ace interview questions.
- Fundamentals, Intermediate, Advance DSA topics: https://lnkd.in/d4ws9xfr
๐ฐ. ๐ฃ๐ฟ๐ฎ๐ฐ๐๐ถ๐ฐ๐ฒ ๐๐ถ๐๐ต ๐ฆ๐ฝ๐ฎ๐ฐ๐ฒ๐ฑ ๐ฅ๐ฒ๐ฝ๐ฒ๐๐ถ๐๐ถ๐ผ๐ป:
- Revisit problems after 3 days, a week, and 15 days. Break down solutions instead of rote memorization.
- 3:7:15 Rule for DSA: https://lnkd.in/dW6a8wcg
๐ฑ. ๐๐ฑ๐ฒ๐ป๐๐ถ๐ณ๐ ๐ฟ๐ฒ๐๐๐ฎ๐ฏ๐น๐ฒ ๐๐ฒ๐ฐ๐ต๐ป๐ถ๐พ๐๐ฒ๐ ๐ฎ๐ป๐ฑ ๐ฐ๐ผ๐ฑ๐ฒ ๐ฏ๐น๐ผ๐ฐ๐ธ๐:
- Isolate common patterns like Binary Search or Depth First Search for focused practice.
- 20 DSA patterns: https://lnkd.in/d9GCezMm
- 14 problem solving patterns: https://lnkd.in/daysVFSz
- DSA questions patterns: https://lnkd.in/d3rRHTfE
๐ฒ. ๐๐ ๐ฝ๐ฎ๐ป๐ฑ ๐ถ๐ป๐๐ผ ๐๐ฟ๐ฒ๐ฎ๐ฑ๐๐ต:
- Once you've mastered core problems and techniques, tackle a wider range of questions. Keep it realistic and relevant to interview scenarios.
- 16 Important algorithms problems: https://lnkd.in/dfjm8ked
- Tips to solve any DSA question by understanding patterns: https://lnkd.in/d9GVyfBY
Additional tips
Practice on paper: Practice whiteboard interviews to improve your planning and coding skills without relying on an IDE. Itโs a practical way to get ready for real interviews.
Ref: Rajat Gajbhiye
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
DSA is so easy when you follow these 6 steps:
๐ญ. ๐๐ผ๐ฐ๐๐ ๐ผ๐ป ๐๐ฒ๐ฝ๐๐ต ๐ผ๐๐ฒ๐ฟ ๐๐ฟ๐ฒ๐ฎ๐ฑ๐๐ต:
- Don't solve 500 coding problems aimlessly. Master around 100 core problems deeply instead.
- 40 Problems on Array, Strings, LinkedList, Stack & Queue, Binary search, Trees, Graph, Sorting and Searching: https://lnkd.in/djnaPkeD
- 40 Problems on Dynamic Programming (DP), Backtracking, Hashing, Heap, Tries, and Greedy Algorithms: https://lnkd.in/dF3h-Khk
๐ฎ. ๐๐ฟ๐ฒ๐ฎ๐๐ฒ ๐ฎ ๐น๐ถ๐๐ ๐ผ๐ณ ๐ธ๐ฒ๐ ๐พ๐๐ฒ๐๐๐ถ๐ผ๐ป๐:
- Use resources like "Strivers A2Z DSA Sheet" by Raj Vikramaditya to curate around 100 core problems.
- https://lnkd.in/dQMGy9zF (Strivers)
๐ฏ. ๐ ๐ฎ๐๐๐ฒ๐ฟ ๐ฒ๐ฎ๐ฐ๐ต ๐ฑ๐ฎ๐๐ฎ ๐๐๐ฟ๐๐ฐ๐๐๐ฟ๐ฒ:
- Understand and implement them by hand. Know how they work internally to ace interview questions.
- Fundamentals, Intermediate, Advance DSA topics: https://lnkd.in/d4ws9xfr
๐ฐ. ๐ฃ๐ฟ๐ฎ๐ฐ๐๐ถ๐ฐ๐ฒ ๐๐ถ๐๐ต ๐ฆ๐ฝ๐ฎ๐ฐ๐ฒ๐ฑ ๐ฅ๐ฒ๐ฝ๐ฒ๐๐ถ๐๐ถ๐ผ๐ป:
- Revisit problems after 3 days, a week, and 15 days. Break down solutions instead of rote memorization.
- 3:7:15 Rule for DSA: https://lnkd.in/dW6a8wcg
๐ฑ. ๐๐ฑ๐ฒ๐ป๐๐ถ๐ณ๐ ๐ฟ๐ฒ๐๐๐ฎ๐ฏ๐น๐ฒ ๐๐ฒ๐ฐ๐ต๐ป๐ถ๐พ๐๐ฒ๐ ๐ฎ๐ป๐ฑ ๐ฐ๐ผ๐ฑ๐ฒ ๐ฏ๐น๐ผ๐ฐ๐ธ๐:
- Isolate common patterns like Binary Search or Depth First Search for focused practice.
- 20 DSA patterns: https://lnkd.in/d9GCezMm
- 14 problem solving patterns: https://lnkd.in/daysVFSz
- DSA questions patterns: https://lnkd.in/d3rRHTfE
๐ฒ. ๐๐ ๐ฝ๐ฎ๐ป๐ฑ ๐ถ๐ป๐๐ผ ๐๐ฟ๐ฒ๐ฎ๐ฑ๐๐ต:
- Once you've mastered core problems and techniques, tackle a wider range of questions. Keep it realistic and relevant to interview scenarios.
- 16 Important algorithms problems: https://lnkd.in/dfjm8ked
- Tips to solve any DSA question by understanding patterns: https://lnkd.in/d9GVyfBY
Additional tips
Practice on paper: Practice whiteboard interviews to improve your planning and coding skills without relying on an IDE. Itโs a practical way to get ready for real interviews.
Ref: Rajat Gajbhiye
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Linkedin
How to ace your interview with DSA questions | Rajat Gajbhiye posted on the topic | LinkedIn
DSA on SUNDAY!
We're back againโก
Here are 40 most asked DSA questions to ace your next interview -
๐๐ฟ๐ฟ๐ฎ๐๐ ๐ฎ๐ป๐ฑ ๐ฆ๐๐ฟ๐ถ๐ป๐ด๐:
1. Find the maximum sum subarray.
2. Find all substrings that are palindromes.
3. Implement the "two sum" problem.
4. Implement Kadane'sโฆ
We're back againโก
Here are 40 most asked DSA questions to ace your next interview -
๐๐ฟ๐ฟ๐ฎ๐๐ ๐ฎ๐ป๐ฑ ๐ฆ๐๐ฟ๐ถ๐ป๐ด๐:
1. Find the maximum sum subarray.
2. Find all substrings that are palindromes.
3. Implement the "two sum" problem.
4. Implement Kadane'sโฆ
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆ๐ Mastering DNS & DHCP Penetration Testing: Protect Your Networkโs Core!
DNS (Domain Name System) and DHCP (Dynamic Host Configuration Protocol) are foundational to network operations. However, their vulnerabilities can make them prime targets for cyberattacks. Understanding how to test and secure these protocols is a critical skill for any cybersecurity professional.
Common DNS Vulnerabilities & Attacks:
1๏ธโฃ DNS Spoofing/Poisoning: Alters DNS responses to redirect users to malicious websites.
2๏ธโฃ DNS Tunneling: Exfiltrates data or establishes backdoors via DNS queries.
3๏ธโฃ Cache Poisoning: Manipulates DNS cache entries to disrupt or redirect traffic.
4๏ธโฃ Zone Transfer Exploitation: Misuses misconfigured servers to access sensitive DNS records.
Common DHCP Vulnerabilities & Attacks:
1๏ธโฃ DHCP Starvation Attack: Exhausts IP leases, causing network disruptions.
2๏ธโฃ Rogue DHCP Server Attack: Deploys unauthorized DHCP servers to provide malicious configurations.
3๏ธโฃ Man-in-the-Middle (MITM) Attacks: Exploits DHCP to intercept sensitive data.
4๏ธโฃ IP Address Spoofing: Mimics authorized devices to gain network access.
Steps to Perform DNS & DHCP Penetration Testing:
1๏ธโฃ Reconnaissance:
โข Use tools like Dig, DNSRecon, and Fierce to identify DNS configurations.
โข Scan for active DHCP servers using DHCPig or Yersinia.
2๏ธโฃ Vulnerability Analysis:
โข Check for weak configurations in DNS records (e.g., open zone transfers).
โข Identify rogue DHCP servers or insufficient IP allocations.
3๏ธโฃ Exploitation:
โข Simulate DNS Spoofing or Cache Poisoning to test resilience.
โข Perform DHCP Starvation or Rogue Server attacks in a controlled environment.
4๏ธโฃ Remediation:
โข Harden DNS configurations (disable unused services, restrict zone transfers).
โข Enable DHCP snooping and IP source guard to prevent rogue DHCP servers.
Pro Tip for Defenders:
โข Implement DNSSEC (Domain Name System Security Extensions) to validate DNS responses.
โข Regularly monitor and test DHCP and DNS servers for vulnerabilities.
๐ Remember: Always test ethically with proper authorization!
๐ DNS and DHCP are the backbone of every network. Securing them not only prevents breaches but ensures smooth operations for businesses.
DNS (Domain Name System) and DHCP (Dynamic Host Configuration Protocol) are foundational to network operations. However, their vulnerabilities can make them prime targets for cyberattacks. Understanding how to test and secure these protocols is a critical skill for any cybersecurity professional.
Common DNS Vulnerabilities & Attacks:
1๏ธโฃ DNS Spoofing/Poisoning: Alters DNS responses to redirect users to malicious websites.
2๏ธโฃ DNS Tunneling: Exfiltrates data or establishes backdoors via DNS queries.
3๏ธโฃ Cache Poisoning: Manipulates DNS cache entries to disrupt or redirect traffic.
4๏ธโฃ Zone Transfer Exploitation: Misuses misconfigured servers to access sensitive DNS records.
Common DHCP Vulnerabilities & Attacks:
1๏ธโฃ DHCP Starvation Attack: Exhausts IP leases, causing network disruptions.
2๏ธโฃ Rogue DHCP Server Attack: Deploys unauthorized DHCP servers to provide malicious configurations.
3๏ธโฃ Man-in-the-Middle (MITM) Attacks: Exploits DHCP to intercept sensitive data.
4๏ธโฃ IP Address Spoofing: Mimics authorized devices to gain network access.
Steps to Perform DNS & DHCP Penetration Testing:
1๏ธโฃ Reconnaissance:
โข Use tools like Dig, DNSRecon, and Fierce to identify DNS configurations.
โข Scan for active DHCP servers using DHCPig or Yersinia.
2๏ธโฃ Vulnerability Analysis:
โข Check for weak configurations in DNS records (e.g., open zone transfers).
โข Identify rogue DHCP servers or insufficient IP allocations.
3๏ธโฃ Exploitation:
โข Simulate DNS Spoofing or Cache Poisoning to test resilience.
โข Perform DHCP Starvation or Rogue Server attacks in a controlled environment.
4๏ธโฃ Remediation:
โข Harden DNS configurations (disable unused services, restrict zone transfers).
โข Enable DHCP snooping and IP source guard to prevent rogue DHCP servers.
Pro Tip for Defenders:
โข Implement DNSSEC (Domain Name System Security Extensions) to validate DNS responses.
โข Regularly monitor and test DHCP and DNS servers for vulnerabilities.
๐ Remember: Always test ethically with proper authorization!
๐ DNS and DHCP are the backbone of every network. Securing them not only prevents breaches but ensures smooth operations for businesses.
Forwarded from Exploiting Crew (Pr1vAt3)
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆCookie stealer which can then be used for session hijacking and Bypassing 2 Factor Authentication:
>> How Does it work?
Big-Papa utilizes malicious javascript code injection...and then makes a GET Request(with cookies) to the Python Web server running on the attacker machine
Note That you need to be man in the middle in order to inject the malicious javascript Code and then steal cookies of the website that the victim is currently visting
For testing purposes copy the Javascript code from the bgp.js file without the script tags and execute in the console of the browser
You can use Bettercap in-order to become man-in-the-middle using bettercap or use arp spoof and then run Big-Papa to inject Javascript
>> For HTTPS?
Big-Papa will work Perfectly against HTTP websites but For HTTPS you can use sslstrip to Downgrade it to HTTP and then utilize Big-Papa
*SSLstrip --> https://github.com/moxie0/sslstrip.git
Still some websites use HTTP and thus their data including Passwords can be read in Clear text but we need to steal cookies in some cases in order to Bypass 2-Factor-Authentication
๐ธ๐ฝ๐ ๐ ๐ฐ๐ป๐ป๐ธ๐ ๐ฐ๐ ๐ธ๐พ๐ฝ & ๐ ๐ ๐ฝ :
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
>> How Does it work?
Big-Papa utilizes malicious javascript code injection...and then makes a GET Request(with cookies) to the Python Web server running on the attacker machine
Note That you need to be man in the middle in order to inject the malicious javascript Code and then steal cookies of the website that the victim is currently visting
For testing purposes copy the Javascript code from the bgp.js file without the script tags and execute in the console of the browser
You can use Bettercap in-order to become man-in-the-middle using bettercap or use arp spoof and then run Big-Papa to inject Javascript
>> For HTTPS?
Big-Papa will work Perfectly against HTTP websites but For HTTPS you can use sslstrip to Downgrade it to HTTP and then utilize Big-Papa
*SSLstrip --> https://github.com/moxie0/sslstrip.git
Still some websites use HTTP and thus their data including Passwords can be read in Clear text but we need to steal cookies in some cases in order to Bypass 2-Factor-Authentication
๐ธ๐ฝ๐ ๐ ๐ฐ๐ป๐ป๐ธ๐ ๐ฐ๐ ๐ธ๐พ๐ฝ & ๐ ๐ ๐ฝ :
1๏ธโฃ git clone https://github.com/vrikodar/Big-Papa.git
2๏ธโฃcd Big-Papa
3๏ธโฃchmod +x install.sh
4๏ธโฃ ./install.sh
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
GitHub
GitHub - moxie0/sslstrip: A tool for exploiting Moxie Marlinspike's SSL "stripping" attack.
A tool for exploiting Moxie Marlinspike's SSL "stripping" attack. - moxie0/sslstrip
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆ๐ฆ๐ข๐ฃ๐ (๐ฆ๐๐ฎ๐ป๐ฑ๐ฎ๐ฟ๐ฑ ๐ข๐ฝ๐ฒ๐ฟ๐ฎ๐๐ถ๐ผ๐ป ๐ฃ๐ฟ๐ผ๐ฐ๐ฒ๐ฑ๐๐ฟ๐ฒ๐) / ๐ฃ๐น๐ฎ๐๐ฏ๐ผ๐ผ๐ธ๐ / ๐ฅ๐๐ป๐ฏ๐ผ๐ผ๐ธ๐โจ
A playbook, also known as a standard operating procedure (SOP), consists of a set of guidelines to handle security incidents and alerts in the SOC.
Incident response methodologies typically involve creating standard operating procedures (SOPs), playbooks, and runbooks to guide teams through the incident response process.
These gudelines provide easy to use operational incident best practices. These cheat sheets are dedicated to incident handling and cover multiple fields in which a CERT team can be involved.
Source: https://lnkd.in/eudq_jJi
Thanks to Societe Generale
โ Worm Infection: https://lnkd.in/ez-kq98Y
โ Social Engineering: https://lnkd.in/e_FJbxDP
โ Information Leakage: https://lnkd.in/eeN8KX8g
โ Insider Abuse: https://lnkd.in/ep4p_THk
โ Customer Phishing: https://lnkd.in/ekTfY7vz
โ Scam: https://lnkd.in/eUHwG3fF
โ Trademark infringement: https://lnkd.in/e3P3xfeb
โ Phishing: https://lnkd.in/eYTi3RQ8
โ Ransomware: https://lnkd.in/eRkctdQn
โ Large_scale_compromise: https://lnkd.in/eYFF43b4
โ 3rd-party_compromise: https://lnkd.in/e8SAu5MT
โ Windows Intrusion: https://lnkd.in/eXCpcx9V
โ Unix Linux lntrusionDetection: https://lnkd.in/eHkm6MMe
โ DDOS: https://lnkd.in/eQ7zZzVt
โ MaliciousNetworkBehaviour: https://lnkd.in/ewVZy2cs
โ Website-Defacement: https://lnkd.in/eraNiHcH
โ WindowsMalwareDetection: https://lnkd.in/ewEx_C6Y
โ Blackmail: https://lnkd.in/eW3zGcPs
โ SmartphoneMalware.pdf: https://lnkd.in/ezjyY4G9
Ref:
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
A playbook, also known as a standard operating procedure (SOP), consists of a set of guidelines to handle security incidents and alerts in the SOC.
Incident response methodologies typically involve creating standard operating procedures (SOPs), playbooks, and runbooks to guide teams through the incident response process.
These gudelines provide easy to use operational incident best practices. These cheat sheets are dedicated to incident handling and cover multiple fields in which a CERT team can be involved.
Source: https://lnkd.in/eudq_jJi
Thanks to Societe Generale
โ Worm Infection: https://lnkd.in/ez-kq98Y
โ Social Engineering: https://lnkd.in/e_FJbxDP
โ Information Leakage: https://lnkd.in/eeN8KX8g
โ Insider Abuse: https://lnkd.in/ep4p_THk
โ Customer Phishing: https://lnkd.in/ekTfY7vz
โ Scam: https://lnkd.in/eUHwG3fF
โ Trademark infringement: https://lnkd.in/e3P3xfeb
โ Phishing: https://lnkd.in/eYTi3RQ8
โ Ransomware: https://lnkd.in/eRkctdQn
โ Large_scale_compromise: https://lnkd.in/eYFF43b4
โ 3rd-party_compromise: https://lnkd.in/e8SAu5MT
โ Windows Intrusion: https://lnkd.in/eXCpcx9V
โ Unix Linux lntrusionDetection: https://lnkd.in/eHkm6MMe
โ DDOS: https://lnkd.in/eQ7zZzVt
โ MaliciousNetworkBehaviour: https://lnkd.in/ewVZy2cs
โ Website-Defacement: https://lnkd.in/eraNiHcH
โ WindowsMalwareDetection: https://lnkd.in/ewEx_C6Y
โ Blackmail: https://lnkd.in/eW3zGcPs
โ SmartphoneMalware.pdf: https://lnkd.in/ezjyY4G9
Ref:
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
lnkd.in
LinkedIn
This link will take you to a page thatโs not on LinkedIn