UNDERCODE TESTING
311 subscribers
311 photos
24 videos
173 files
29.8K links
๐Ÿฆ‘ World first platform which Collect & Analyzes every New hacking method.

+ Free AI Practice.

(New Bug Bounty Methods, Tools Updates, AI & Courses).

โœจ Services: Undercode.help/services

โœจyoutube.com/undercode

@Undercode_Testing
Download Telegram
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘๐‚๐จ๐ฆ๐ฉ๐š๐ง๐ฒ ๐–๐ข๐ฌ๐ž ๐’๐๐‹ ๐ˆ๐ง๐ญ๐ž๐ซ๐ฏ๐ข๐ž๐ฐ ๐๐ฎ๐ž๐ฌ๐ญ๐ข๐จ๐ง๐ฌ

Here , I have listed out all SQL interview questions for your easy reference.

1. Amazon SQL Interview Question for Data Analyst Position [2-3 Year Of Experience ] | Data Analytics
https://lnkd.in/g2RzsKdq

2. Airbnb SQL Interview Question | Convert Comma Separated Values into Rows | Data Analytics
https://lnkd.in/gpMbU-dF

3. Adobe Interesting SQL Interview Question | Solving Using 2 Approaches | Data Analytics
https://lnkd.in/g_-_9ymd

4. Spotify SQL Interview Problem | Top 5 Artists | Aggregation and Window Functions in SQL
https://lnkd.in/gtfaugd3

5. L&T Technology Services SQL Interview Problem | Print Highest and Lowest Salary Employees in Each Department
https://lnkd.in/ggY82FJW

6. Ameriprise Financial Services, LLCSQL Interview Problem | Data Analytics
https://lnkd.in/gS_Yqq6c

7. Tiger Analytics SQL Interview Question for Data Engineering Position
https://lnkd.in/ghjE_CXp

8. PwC SQL Interview Question | BIG 4 |Normal vs Mentos Life ๐Ÿ˜Ž
https://lnkd.in/g9SkkX9x

9. Honeywell SQL Interview Question | Print Movie Stars (โญ โญ โญ โญโญ) For best movie in each Genre
https://lnkd.in/gSDgB9Me

10. Angel One Easy-Peasy SQL Interview Question for a Data Science Position
https://lnkd.in/geaU3we7

11. Practice FAANG SQL Interview Questions For Free | Ace The SQL Interview | Data Analytics
https://lnkd.in/g4AFgen3

12. Accenture SQL Interview Question | Database Case Sensitivity vs Insensitivity
https://lnkd.in/gR6F_8zf

13. American Express SQL Interview Question and Solution | Page Recommendation
https://lnkd.in/g_sMN26m

14. Fractal Analytics SQL Interview Question (Game of Thrones Database) | SQL for Data Engineer
https://lnkd.in/gGcsBms5

15. Netflix Data Cleaning and Analysis Project | End to End Data Engineering Project (SQL + Python)
https://lnkd.in/gS8mT7Fn

16. Swiggy Data Analyst SQL Interview Question and Answer
https://lnkd.in/gSyhmmhd

17. Cracked Myntra as Data Analyst with 1 Year Experience
https://lnkd.in/gekpAit8

18. PwC SQL Interview Question for a Data Analyst Position | SQL For Analytics
https://lnkd.in/gyD5Pjny

19. PayPal Data Engineer SQL Interview Question (and a secret time saving trick)
https://lnkd.in/gAJ_Ug79

20. Adobe Interesting SQL Interview Question | Solving Using 2 Approaches | Data Analytics
https://lnkd.in/gEEAfi8j

21. Walmart Labs SQL Interview Question for Senior Data Analyst Position | Data Analytics
https://lnkd.in/gRBPb-ms

22. PayPal SQL Interview Problem (Level Hard) | Advanced SQL Problem
https://lnkd.in/gGZaYt6N

Ref: Abhisek Sahu
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘SQL Injection Detection Techniques"

SQL Injection remains a critical vulnerability in web applications. Detecting it early is key to protecting your data. Some effective detection techniques include.

Ref: Amit Kumar
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘Roadmap for learning Low-Level Design (LLD):

โžค ๐—™๐˜‚๐—ป๐—ฑ๐—ฎ๐—บ๐—ฒ๐—ป๐˜๐—ฎ๐—น ๐—–๐—ผ๐—ป๐—ฐ๐—ฒ๐—ฝ๐˜๐˜€:

1. Basics OOP Concepts:
- https://lnkd.in/dhX-yYnb
2. SOLID Principles:
- https://lnkd.in/drsM7izj
3. DRY, YAGNI and KISS Principle:
- https://lnkd.in/d7Dk9Mpb
- https://lnkd.in/dvdm2mgR

โžค ๐——๐—ฒ๐˜€๐—ถ๐—ด๐—ป ๐—ฃ๐—ฎ๐˜๐˜๐—ฒ๐—ฟ๐—ป๐˜€

1. Creational Patterns
- Singleton, Factory Method, Abstract Factory, Builder, Prototype and Structural Patterns
- https://lnkd.in/dfr_3f-U
- https://lnkd.in/d2s88tuV

2. Adapter
- Facade, Decorator, Composite and Behavioral Patterns
- https://lnkd.in/dtiFe8AN

3. Strategy
- Iterator, Observer, Template Method, Command and State

โžค ๐—จ๐—ป๐—ถ๐—ณ๐—ถ๐—ฒ๐—ฑ ๐— ๐—ผ๐—ฑ๐—ฒ๐—น๐—ถ๐—ป๐—ด ๐—Ÿ๐—ฎ๐—ป๐—ด๐˜‚๐—ฎ๐—ด๐—ฒ (๐—จ๐— ๐—Ÿ)

1. Class Diagrams
- Class, Attributes, Methods, Interfaces, Abstract Class, Enumeration and Multiplicity
- https://lnkd.in/dxeh7vSz

2. Use Case, Sequence, Activity and State Machine Diagram
- https://lnkd.in/dgVYbmPA

โžค ๐—ช๐—ฎ๐˜๐—ฐ๐—ต ๐—ฅ๐—ฒ๐˜€๐—ผ๐˜‚๐—ฟ๐—ฐ๐—ฒ๐˜€:

1. Shrayansh Jain: https://lnkd.in/dhW5VmFa
2. Gaurav Sen: https://lnkd.in/dgjFGmXc
3. The Code Mate: https://lnkd.in/d8_6yTSN
4. Soumyajit Bhattacharyay: https://lnkd.in/dFe4t5gZ

โžค ๐—ง๐—ผ๐—ฝ ๐—ฅ๐—ฒ๐—ฝ๐—ผ๐˜€๐—ถ๐˜๐—ผ๐—ฟ๐—ถ๐—ฒ๐˜€ ๐˜๐—ผ ๐— ๐—ฎ๐˜€๐˜๐—ฒ๐—ฟ ๐—Ÿ๐—Ÿ๐——โ€‹:

- https://lnkd.in/dAb9m84N
- https://lnkd.in/dvzAdaGt
- https://lnkd.in/dXypcpR4
- https://lnkd.in/dBYMX7Ph

โžค ๐—ฃ๐—ฟ๐—ฎ๐—ฐ๐˜๐—ถ๐—ฐ๐—ฎ๐—น ๐—˜๐˜…๐—ฎ๐—บ๐—ฝ๐—น๐—ฒ๐˜€:

- Standard problem solutions: https://lnkd.in/dXypcpR4
- Practice questions: https://lnkd.in/dCMb2nFV

โžค ๐—ฆ๐—ฒ๐—น๐—ณ-๐—”๐˜€๐˜€๐—ฒ๐˜€๐˜€๐—บ๐—ฒ๐—ป๐˜:

- Question 1: https://lnkd.in/dQRCdKhs
- Question 2: https://lnkd.in/dHmEiE79

Just preparing for DSA is not going to get you selected. During technical interviews, you are expected to have some level of understanding of low-level designs.

Ref: Rajat GajbhiyeRajat Gajbhiye
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘PowerShell-Hunter: Your New Favorite Event Log Analysis Tool!

๐Ÿ” Tired of drowning in PowerShell logs? We've got you covered:
โ€ข Smart pattern detection for malicious behaviors
โ€ข Risk scoring to prioritize threats
โ€ข Export to CSV/JSON for your workflow
โ€ข Extensible pattern matching

๐Ÿš€ Perfect for:
โ€ข Incident Response
โ€ข Threat Hunting
โ€ข Forensics
โ€ข SOC Analysis

๐Ÿ’ก Why PowerShell-Hunter?
โ€ข Process thousands of 4104 events in seconds
โ€ข Pre-configured detection patterns
โ€ข Catch encoded commands, suspicious downloads, and more
โ€ข Built by defenders, for defenders

๐Ÿ”ฅ Get started: https://github.com/MHaggis/PowerShell-Hunter

Ref: Michael H
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘Get Your AI powered terminal assistant:

curl -sS https://raw.githubusercontent.com/ekkinox/yai/main/install.sh | bash
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘Looking for a comprehensive MySQL Blind (Time-Based) SQL Injection Payload List? Here's a handy collection of payloads to help you in your testing process. Perfect for bug bounty hunters, penetration testers, and security researchers.

@UndercodeCommunity
Ref: AMIT KUMARAMIT KUMAR
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘Free Courses + Certification (New Collections):

Google Data Analytics
๐Ÿ‘‰ https://lnkd.in/gv4whkFn

Advanced Google Analytics
๐Ÿ‘‰ https://lnkd.in/gnswTs7t

Google Project Management
๐Ÿ‘‰ https://lnkd.in/geUMD3K9

Foundations of Project Management
๐Ÿ‘‰ https://lnkd.in/gJCjD6us

1. IBM Project Manager
๐Ÿ”—https://lnkd.in/gTaaHHPQ

3. IBM Data Analyst
๐Ÿ”—https://lnkd.in/gMingmB2

4. IBM Data Analytics with Excel and R
๐Ÿ”—https://lnkd.in/gejqD9ry

5. IBM Data Science
๐Ÿ”—https://lnkd.in/guyY26Ye

6. IBM Data Engineering
๐Ÿ”—https://lnkd.in/geFjWDCj

7. IBM AI Engineering
๐Ÿ”—https://lnkd.in/gQpHeu7e

3-Learn SQL Basics for Data Science:
๐ŸŒ€https://lnkd.in/gKcT3SdP

4-Excel for Business :
๐ŸŒ€https://lnkd.in/geHAfHAK

5-Python for Everybody :
๐ŸŒ€https://lnkd.in/gUga4caw

6-Data Analysis Visualization Foundations :
๐ŸŒ€https://lnkd.in/geWz5T-v

7-Machine Learning Specialization:
๐ŸŒ€https://lnkd.in/gCZqk6-J

8-Introduction to Data Science:
๐ŸŒ€https://lnkd.in/gK_C8XKy

1. Microsoft Azure Data Scientist Associate
๐Ÿ‘‰ https://lnkd.in/gaX-nhS3

2. Microsoft Cybersecurity Analyst Professional
๐Ÿ‘‰ https://lnkd.in/g_WYd7iw

3. Microsoft Power BI Data Analyst Professional
๐Ÿ‘‰ https://lnkd.in/gi2FQkf7

4. Microsoft Azure Data Engineering Associate (DP-203) Professional
๐Ÿ‘‰ https://lnkd.in/ggUAK2zx

5. Microsoft Azure Developer Associate (AZ-204) Professional
๐Ÿ‘‰ https://lnkd.in/gF99Jh_s

6. Microsoft Azure Security Engineer Associate (AZ-500) Professional
๐Ÿ‘‰ https://lnkd.in/gqgBVvUc

@UndercodeCommunity
Ref: Vikas SinghVikas Singh
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
๐Ÿฆ‘Active Directory Hardening Checklist
๐Ÿฆ‘How to Spot a Pentester
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘Top Password Reset Functionality Bugs
๐Ÿ›ก๏ธ
Testing password reset flows is critical to ensuring account security. Hereโ€™s a checklist of common vulnerabilities to watch out for:

No rate limiting

Token leakage

Email manipulation

Self-XSS risks

Brute force reset attempts

Each of these bugs can lead to serious account takeovers (critical vulnerability) if overlooked. What other password reset vulnerabilities have you come across in your tests?

Ref: Amit Kumar
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
๐Ÿฆ‘This one command is enough to knock down your entire wifi.

-S : Send syn packets
--flood : Sent packets as fast as possible

Simple DOS attack, works really well on non-enterprise networks. Implement firewall/filter rules in your router to avoid these attacks.

However in some cases it can increase resources usage on router that could still lead to crashes.

Ref: Steven Lim
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from Exploiting Crew (Pr1vAt3)
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘Top Shodan Dorks for Finding Sensitive IoT Data ๐ŸŒ

Are you testing IoT devices and systems for vulnerabilities? Shodan, the search engine for internet-connected devices, can reveal critical data with the right queries.

This cheat sheet contains useful Shodan dorks to identify exposed services, misconfigurations, and unsecured devices, such as: โœ… Open ports: 23 (Telnet), 21 (FTP), 3306 (MySQL)
โœ… Exposed services: PostgreSQL, MongoDB, Apache, Jenkins, MikroTik
โœ… Sensitive information: "MongoDB Server Information," "200 OK" responses, and certificate details

Some highlights include:

Finding unprotected remote desktops (port:3389)

Identifying insecure databases (port:27017, MongoDB authentication disabled)

Locating industrial devices and firmware (port:5006,5007 Mitsubishi)


Why does this matter?
IoT devices are often overlooked and can serve as easy targets for attackers if not properly secured. By searching for exposed ports and services, security researchers can help organizations address these risks proactively.

๐Ÿ“ข A friendly reminder: Use this knowledge responsibly. Only test systems you have permission to access!

Ref: AMIT KUMARAMIT KUMAR
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘ChatGPT Prompts That Will Change Your Life Before 2025

1. Use the 80/20 principle to learn faster
Prompt: "I want to learn about [insert topic]. Identify and share the most important 20% of learnings from this topic that will help me understand 80% of it."

2. Learn and develop any new skill
Prompt: "I want to learn / get better at [insert desired skill]. I am a complete beginner. Create a 30-day learning plan that will help a beginner like me learn and improve this skill."

3. Summarize long documents and articles
Prompt: "Summarize the text below and give me a list of bullet points with key insights and the most important facts." [Insert text]

4. Train ChatGPT to generate prompts for you
Prompt: "You are an AI designed to help [insert profession]. Generate a list of the 10 best prompts for yourself. The prompts should be about [insert topic]."

5. Master any new skill
Prompt: "I have 3 free days a week and 2 months. Design a crash study plan to master [insert desired skill]."

6. Simplify complex information
Prompt: "Break down [insert topic] into smaller, easier-to-understand parts. Use analogies and real-life examples to simplify the concept and make it more relatable."

Save this now to unlock the power of ChatGPT before 2025

Ref: Vikas SinghVikas Singh
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from Exploiting Crew (Pr1vAt3)
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘P11-Malware Development for Red Teamers.

Structure of a Portable Executable (PE) file
-----
MS-DOS Header

Located at the very beginning of the PE file, this header ensures backward compatibility with MS-DOS systems. It starts with the signature "MZ" (hexadecimal 4D5A) to indicate that the file is an executable. The header also includes metadata and, most importantly, a pointer (at the e_lfanew field) to the location of the PE signature, which marks the start of the Windows-specific portion of the file.
-
MS-DOS Stub

Following the MS-DOS Header is a small program, known as the DOS Stub, that displays a message if the file is run in an MS-DOS environment. Typically, this message is: "This program cannot be run in DOS mode." While it serves no purpose on modern Windows systems, it remains in the file for compatibility reasons.
-
PE Signature

This marks the beginning of the Portable Executable (PE) format. The signature is always PE\0\0 (hexadecimal 50 45 00 00), signaling that the file conforms to the PE standard. This signature separates the DOS-specific data from the Windows-specific data.
-
File Header

Following the PE Signature, the File Header contains critical information about the executable. This includes details like the target machine type (e.g., x86 or x64), the number of sections, the timestamp of file creation, and flags indicating the file's characteristics. It acts as a roadmap for understanding the executable's overall structure.
-
Optional Header

Despite its name, this header is mandatory for executable files. It provides essential details such as the entry point (the starting address for execution), the image base (preferred memory location), and sizes of various segments. This header bridges the gap between the high-level structure of the file and its low-level memory layout.
-
Section Headers (PE Sections)

These headers define the various sections of the executable, such as .text (code), .data (initialized data), and .rdata (read-only data). Each section header specifies attributes like the section's size, location in memory, and access permissions. These sections contain the actual content of the program, including its instructions, data, and resources.

Ref: Mohit SoniMohit Soni
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–