UNDERCODE TESTING
312 subscribers
311 photos
24 videos
173 files
29.9K links
๐Ÿฆ‘ World first platform which Collect & Analyzes every New hacking method.

+ Free AI Practice.

(New Bug Bounty Methods, Tools Updates, AI & Courses).

โœจ Services: Undercode.help/services

โœจyoutube.com/undercode

@Undercode_Testing
Download Telegram
html injection.pdf
381.2 KB
๐Ÿฆ‘Understanding HTML Injection ๐Ÿ’‰

HTML injection is a type of attack where malicious HTML code is inserted into a website. This can lead to a variety of issues, from minor website defacement to serious data breaches. Unlike other web vulnerabilities, HTML injection targets the markup language that forms the backbone of most websites.
This attack differs from other web vulnerabilities that exploit server or database weaknesses because it focuses on manipulating the structure and content of a webpage

Ref: Mehedi Hasan Babu
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from Exploiting Crew (Pr1vAt3)
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘IAM vs. PAM: Understanding the Key Differences ๐Ÿ”’

In todayโ€™s rapidly evolving cybersecurity landscape, managing access and securing sensitive data is more critical than ever. Two foundational tools in this effort are Identity and Access Management (IAM) and Privileged Access Management (PAM). While both are essential, they serve distinct purposes:

๐Ÿ”‘ Identity and Access Management (IAM)

๐Ÿ”ป Focus: Managing identities and access rights for all users.
๐Ÿ”ป Scope: Broader, covering employees, contractors, partners, and even devices.
๐Ÿ”ป Key Functions: Authentication, Single Sign-On (SSO), user provisioning/de-provisioning, governance, and compliance reporting.
๐Ÿ”ป Goal: Streamlining access across the IT ecosystem while improving operational efficiency and ensuring compliance.

๐Ÿ”’ Privileged Access Management (PAM)

๐Ÿ”ป Focus: Securing and controlling access to privileged accounts with elevated permissions.
๐Ÿ”ป Scope: Narrower, targeting administrators, IT staff, service accounts, and third-party vendors.
๐Ÿ”ป Key Functions: Credential vaulting, session monitoring, least privilege enforcement, and just-in-time access.
๐Ÿ”ป Goal: Protecting critical systems and sensitive data from breaches or abuse of high-risk accounts.

Implementing both IAM and PAM creates a layered security approach. IAM ensures proper access for all users, while PAM locks down high-risk areas, minimizing vulnerabilities and adhering to the Zero Trust framework.

๐Ÿ“Š This visual summary (attached) simplifies the key differences and highlights how these tools work together to strengthen cybersecurity.

Ref: Fadi Kazdar
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from Exploiting Crew (Pr1vAt3)
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘Understanding Modern Cybersecurity Tools: EDR, XDR, SOAR, SIEM, and Integrated Solutions ๐Ÿšจ

Navigating the world of cybersecurity solutions can be complex. Each tool serves a unique purpose, but understanding their differences is crucial for building an effective security strategy. Here's a quick comparison:

โœ… EDR (Endpoint Detection and Response): Focuses on endpoint security by detecting/responding to threats on devices like laptops and servers. Great for organizations with endpoint-centric threats.

โœ… XDR (Extended Detection and Response): Expands visibility across endpoints, networks, and cloud environments, providing unified threat detection across domains.

โœ… SOAR (Security Orchestration, Automation, and Response): Automates and streamlines incident response processes, saving time and improving efficiency.

โœ… SIEM (Security Information and Event Management): Offers centralized log management and real-time monitoring for identifying and correlating security events.

โœ… Integrated Solution (EDR + XDR + SOAR + SIEM): Combines the strengths of all these tools for holistic threat detection, response, and seamless integration.

Ref: Fadi Kazdar
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘๐ƒ๐Ž๐Œ ๐—๐’๐’ Testing Method

While "DOM Invader" is not a new feature of Burp, I feel that alot of people don't use it enough (or are not aware of it)

It works by submiting a random string generated by Burp (named "canary") in existing input fields or URL parameters

Then "DOM Invader" will check how your input is processed, providing you with necessary context and sanitization details.

1. Start Burp Browser
2. Turn on the DOM Invader
3. Copy and Paste the canary in the target input field or URL parameter
4. Check the DOM Invader tab for "Interesting sinks"
5. Craft the payload or use the "Exploit" option to automate

Ref: Andrei Agape
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘Malwares Detection bypass:

๐‘ด๐’Š๐’”๐’–๐’”๐’Š๐’๐’ˆ ๐‘บ๐’•๐’“๐’–๐’„๐’•๐’–๐’“๐’†๐’… ๐‘ฌ๐’™๐’„๐’†๐’‘๐’•๐’Š๐’๐’ ๐‘ฏ๐’‚๐’๐’…๐’๐’†๐’“๐’” ๐Ÿ’ก

In malware analysis, one common anti-disassembly technique is ๐’๐ญ๐ซ๐ฎ๐œ๐ญ๐ฎ๐ซ๐ž๐ ๐„๐ฑ๐œ๐ž๐ฉ๐ญ๐ข๐จ๐ง ๐‡๐š๐ง๐๐ฅ๐ข๐ง๐  (๐’๐„๐‡) manipulation.

SEH is a mechanism in Windows for managing exceptions, but it can also be exploited to confuse disassemblers and debuggers. By injecting fake exception records into the SEH chain, attackers can redirect program flow, making it difficult for static analysis tools to follow the actual execution path. This redirection not only complicates reverse engineering but also disrupts debugging processes, forcing tools to misinterpret or skip over key code sections.

Ref: Ait Ichou Mustapha
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from Exploiting Crew (Pr1vAt3)
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘2025 ๐…๐‘๐„๐„ ๐๐‹๐”๐„ ๐“๐„๐€๐Œ ๐‚๐˜๐๐„๐‘ ๐’๐„๐‚๐”๐‘๐ˆ๐“๐˜ ๐“๐‘๐€๐ˆ๐๐ˆ๐๐† (New Urls):

๐Ÿ”— HackerSploit Training Course -Part 1- (YouTube):
https://lnkd.in/eH3UYgp5

๐Ÿ”— HackerSploit Training Course -Part 2- (Linode Live):
https://lnkd.in/ebEGVdGY

๐Ÿ”— Network Defense/Digital Forensics (EC-Council):
https://lnkd.in/ewiVUkYt

๐Ÿ”— Introduction to Cyber Security -with Case Study: WhatsApp Attack- (Great Learning):
https://lnkd.in/eUdRn8Km

๐Ÿ”— Digital Forensics (Infosec Train):
https://lnkd.in/eR58kTPJ

๐Ÿ”— Introduction Courses (Security Blue Team):
https://lnkd.in/efuAKp4h

๐Ÿ”— Introduction to Cyber Security/Cloud Security/CISSP (Simplilearn):
https://lnkd.in/ey5TPBdr

๐Ÿ”— Network Security NSE1/NSE2/NSE3 (Fortinet NETWORK SECURITY):
https://lnkd.in/ehV9aUm7

๐Ÿ”— SOC Analyst (Splunk):
https://lnkd.in/esq4zFTg

๐Ÿ”— Proactive Security Operations Center (Picus Security Academy):
https://lnkd.in/eYA26eN5

๐Ÿ”— Certified in Cybersecurityโ„  - CC (ISC2):
https://lnkd.in/eq2E2ci8

๐Ÿ”— Cyber Aces (SANS Institute):
https://lnkd.in/eNCPrtdd

๐Ÿ”— Introduction to IT and Cybersecurity (Cybrary):
https://lnkd.in/emAES4i7

๐Ÿ”— SOC Analyst Pathway: LetsDefend https://letsdefend.io/

๐Ÿ”— Computer Systems Security (Massachusetts Institute of Technology):
https://lnkd.in/eUDQeT3v

Ref: Adnan AlamAdnan Alam
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from Exploiting Crew (Pr1vAt3)
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘AI Agents: The Security Approach ๐Ÿ”

AI agents are changing the game, helping us solve problems and innovate faster than ever. But with all this power comes many questions, some of them: How do we keep them safe? What should be the security considerations for each layer of this future AI framework?

*๏ธโƒฃ Input Layer

> Security Risk: Data poisoning and adversarial attacks could corrupt input data or manipulate real-time feedback loops.

> Tip: Implement data validation pipelines to sanitize incoming data.
Use secure APIs for real-time inputs and Continuously monitor for anomalies in user feedback patterns.

*๏ธโƒฃ Agent Orchestration Layer

> Security Risk: Inter-agent communication could be exploited for unauthorized data sharing or infiltration.

> Tip: Use end-to-end encryption for inter-agent communication. Employ RBAC to ensure agents only perform tasks for which theyโ€™re authorized and Monitor orchestration processes for unexpected task allocation behaviors.

*๏ธโƒฃ AI Agents Layer

> Security Risk: Malicious actors could exploit self-learning loops to insert harmful behaviors or compromise models.

> Tip: Regularly test models with adversarial simulation frameworks to identify vulnerabilities. Log and review planning, reflection, and tool usage steps to detect anomalies and secure model updates to prevent injection attacks during retraining.

*๏ธโƒฃ Retrieval Layer

> Security Risk: Vector stores and knowledge graphs are high-value targets for attackers seeking to steal or manipulate critical information.

> Tip: Encrypt data at rest and in transit using robust protocols like AES-256. Apply zero-trust principles to storage accessโ€”verify every request. Maintain immutable logs to track data access and modifications.

*๏ธโƒฃ Output Layer

> Security Risk: Unauthorized enrichment or synthetic data generation could leak sensitive information or introduce malicious payloads.

> Tip: Use watermarking and audit trails for enriched outputs. Apply strict controls to ensure customizable outputs donโ€™t expose sensitive data and
Integrate DLP policies into output workflows.

*๏ธโƒฃ Service Layer

> Security Risk: Automated insight generation and multi-channel delivery could introduce phishing or unauthorized data dissemination risks.

> Tip: Implement AI-generated output verification to prevent spoofing or misinformation. Regularly audit multi-channel delivery systems for misconfigured endpoints. Enforce secure delivery protocols to safeguard automated insights.

๐Ÿ’ก Foundational Security Principles

> Ethics & Responsible AI: Regularly assess models for biases that attackers could exploit.
> Compliance: Align with frameworks like GDPR, CCPA, and AI-specific laws.
> Human-AI Collaboration: Build explainability into every decision to reduce the "black box" effect.

Ref: Elli Shlomo (IR)Elli Shlomo (IR)
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from Exploiting Crew (Pr1vAt3)
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘ The Data Privacy Checklist: 7 Must-Have Practices for Every Organization

Protecting data is no longer optional, it's a necessity. Whether you're a startup or a global enterprise, safeguarding sensitive information must be at the core of your operations. Here are 7 essential data privacy practices that every organization should implement:

๐Ÿ”’ Data Encryption: Encrypt sensitive data at rest and in transit to shield it from unauthorized access.

๐Ÿ”„ Regular Software Updates: Keep systems up to date to eliminate vulnerabilities.

๐Ÿ”‘ Strong Authentication: Implement multi-factor authentication (MFA) for robust security.

๐Ÿ‘ฉโ€๐Ÿซ Employee Training: Educate your team on phishing, social engineering, and data protection protocols.

๐Ÿ’พ Backup and Recovery: Regularly back up data and establish a recovery plan for emergencies.

๐Ÿค Third-Party Risk Management: Vet vendors to ensure their practices align with your standards.

โšก๏ธ Incident Response Plan: Be ready to manage and mitigate breaches swiftly.

๐ŸŒŸ By integrating these practices into your cybersecurity strategy, you can reduce risks and ensure compliance with data protection standards.

Ref: Fadi Kazdar
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from Exploiting Crew (Pr1vAt3)
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿฆ‘ How to Hunt LFI Using Google Dorks - PoC ๐Ÿšจ

Welcome to another exciting episode on HackWithRohit! ๐Ÿš€
In this video, weโ€™ll dive deep into:
๐Ÿ” Local File Inclusion (LFI) vulnerabilities and how they can expose sensitive files on web servers.
๐Ÿ’ก Leveraging Google Dorks as a powerful tool to uncover vulnerable endpoints.
๐Ÿ›  A step-by-step demonstration of identifying and exploiting LFI in real-world scenarios.
๐Ÿ›ก Disclaimer:
This video is strictly for educational purposes only. Always ensure you have permission to test and follow ethical hacking guidelines. Unauthorized testing or exploitation is illegal and against the principles of ethical hacking.
๐Ÿ’ฌ Discussion Time:
Have you encountered LFI during your bug hunting journey?
Share your tips and tricks in the comments!
๐Ÿ“Œ Donโ€™t forget to like, comment, and subscribe to stay updated on the latest bug bounty techniques and tools.

Ref: ROHITH SROHITH S
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from Exploiting Crew (Pr1vAt3)
bloodhound.pdf
2.3 MB
๐Ÿฆ‘Mastering Active Directory Enumeration with BloodHound ๐Ÿ”๐Ÿ’ป

Just explored the "BloodHound Active Directory Enumeration Tool"โ€”an essential resource for both offensive and defensive security professionals. This guide simplifies the process of visualizing and understanding Active Directory attack paths and security gaps, helping organizations stay secure.

Highlights from the guide:
โœ”๏ธ Step-by-step installation for Linux and Windows
โœ”๏ธ Techniques to extract and analyze domain data
โœ”๏ธ Pre-built queries to identify vulnerabilities like AS-REP roasting, Kerberoasting, and DC Sync attacks
โœ”๏ธ Utilizing SharpHound and PowerShell for efficient data collection
โœ”๏ธ Practical advice for Red and Blue Teams alike

Whether you're on the offensive or working to harden your network's defenses, BloodHound is a game-changer for Active Directory enumeration and analysis.

Ref: in pdf
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘Recommended courses:

Google Data Analytics
๐Ÿ‘‰ https://lnkd.in/gv4whkFn

Advanced Google Analytics
๐Ÿ‘‰ https://lnkd.in/gnswTs7t

Google Project Management
๐Ÿ‘‰ https://lnkd.in/geUMD3K9

Foundations of Project Management
๐Ÿ‘‰ https://lnkd.in/gJCjD6us

1. IBM Project Manager
๐Ÿ”—https://lnkd.in/gTaaHHPQ

3. IBM Data Analyst
๐Ÿ”—https://lnkd.in/gMingmB2

4. IBM Data Analytics with Excel and R
๐Ÿ”—https://lnkd.in/gejqD9ry

5. IBM Data Science
๐Ÿ”—https://lnkd.in/guyY26Ye

6. IBM Data Engineering
๐Ÿ”—https://lnkd.in/geFjWDCj

7. IBM AI Engineering
๐Ÿ”—https://lnkd.in/gQpHeu7e

3-Learn SQL Basics for Data Science:
๐ŸŒ€https://lnkd.in/gKcT3SdP

4-Excel for Business :
๐ŸŒ€https://lnkd.in/geHAfHAK

5-Python for Everybody :
๐ŸŒ€https://lnkd.in/gUga4caw

6-Data Analysis Visualization Foundations :
๐ŸŒ€https://lnkd.in/geWz5T-v

7-Machine Learning Specialization:
๐ŸŒ€https://lnkd.in/gCZqk6-J

8-Introduction to Data Science:
๐ŸŒ€https://lnkd.in/gK_C8XKy

1. Microsoft Azure Data Scientist Associate
๐Ÿ‘‰ https://lnkd.in/gaX-nhS3

2. Microsoft Cybersecurity Analyst Professional
๐Ÿ‘‰ https://lnkd.in/g_WYd7iw

3. Microsoft Power BI Data Analyst Professional
๐Ÿ‘‰ https://lnkd.in/gi2FQkf7

4. Microsoft Azure Data Engineering Associate (DP-203) Professional
๐Ÿ‘‰ https://lnkd.in/ggUAK2zx

5. Microsoft Azure Developer Associate (AZ-204) Professional
๐Ÿ‘‰ https://lnkd.in/gF99Jh_s

6. Microsoft Azure Security Engineer Associate (AZ-500) Professional
๐Ÿ‘‰ https://lnkd.in/gqgBVvUc

Ref: Vikas Singh
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘ChatGPT Prompts That Will Change Your Life Before 2025

1. Use the 80/20 principle to learn faster
Prompt: "I want to learn about [insert topic]. Identify and share the most important 20% of learnings from this topic that will help me understand 80% of it."

2. Learn and develop any new skill
Prompt: "I want to learn / get better at [insert desired skill]. I am a complete beginner. Create a 30-day learning plan that will help a beginner like me learn and improve this skill."

3. Summarize long documents and articles
Prompt: "Summarize the text below and give me a list of bullet points with key insights and the most important facts." [Insert text]

4. Train ChatGPT to generate prompts for you
Prompt: "You are an AI designed to help [insert profession]. Generate a list of the 10 best prompts for yourself. The prompts should be about [insert topic]."

5. Master any new skill
Prompt: "I have 3 free days a week and 2 months. Design a crash study plan to master [insert desired skill]."

6. Simplify complex information
Prompt: "Break down [insert topic] into smaller, easier-to-understand parts. Use analogies and real-life examples to simplify the concept and make it more relatable."

Save this now to unlock the power of ChatGPT before 2025

๐Ÿ‘‰ Courses From Google

๐Ÿ“• 7000+ Course Free Access: https://lnkd.in/dzCcMS7n

Google Data Analytics
๐Ÿ‘‰ https://lnkd.in/gv4whkFn

Advanced Google Analytics
๐Ÿ‘‰ https://lnkd.in/gnswTs7t

Google AI Essentials j
๐Ÿ‘‰ https://lnkd.in/gKyDHMhe

Ref: Khushboo
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘๐…๐‘๐„๐„ ๐€๐ˆ ๐œ๐จ๐ฎ๐ซ๐ฌ๐ž๐ฌ ๐ญ๐จ ๐ ๐ž๐ญ ๐ฒ๐จ๐ฎ ๐ฆ๐š๐ฌ๐ฌ๐ข๐ฏ๐ž๐ฅ๐ฒ ๐š๐ก๐ž๐š๐:

๐Ÿ”— Links are included.
๐Ÿ”– Save for later.

๐Ÿ”ƒ7000+ Courses Learn without limits: https://lnkd.in/gfYC9rxB

Google Prompting Essentials
๐Ÿ”— https://lnkd.in/gghsW2kP

Programming with Generative AI
๐Ÿ”— https://lnkd.in/gAnKXgzF

Foundations of AI and Machine Learning
๐Ÿ”— https://lnkd.in/gyEP56i9

IBM AI Developer Professional Certificate
๐Ÿ”—https://lnkd.in/gSAxDbxv

1๏ธโƒฃ ChatGPT for beginners
๐Ÿ”— https://lnkd.in/gRw5dcCG

2๏ธโƒฃ Generative AI for Project Managers
๐Ÿ”—https://lnkd.in/gUNDFU7C

3๏ธโƒฃ Generative AI for Product Managers
๐Ÿ”—https://lnkd.in/g5aX2Qbr

4๏ธโƒฃ Navigating Generative AI for Leaders
๐Ÿ”— https://lnkd.in/gkQ_y7ZK

5๏ธโƒฃ Generative AI for Business Consultants
๐Ÿ”— https://lnkd.in/gQj4czyE

6๏ธโƒฃ Generative AI for Data Scientists
๐Ÿ”— https://lnkd.in/gPUcZRRq

7๏ธโƒฃ Generative AI for Data Analysts
๐Ÿ”— https://lnkd.in/g-mCEN64

8๏ธโƒฃ Generative AI for Software Developers
๐Ÿ”— https://lnkd.in/gYfBi8hM

9๏ธโƒฃ Generative AI for Cybersecurity Professionals
๐Ÿ”— https://lnkd.in/gyicuxb5

๐Ÿ”Ÿ Generative AI for Data Engineers
๐Ÿ”— https://lnkd.in/gTBzGWB2

Ref: Khushboo

@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
๐Ÿฆ‘XSS payload generated using JSfuck, for bypass attribute filters ๐Ÿ›ก๏ธ

https://pastebin.ubuntu.com/p/5sVVKjqXxx