Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆWhat is Azure Private Link?
Azure Private Link provides secure access to Azure PaaS services and customer-owned or partner-hosted services via a private endpoint within your virtual network. With Azure Private Link, all traffic between your virtual network and the connected service is routed through Microsoft's backbone network, ensuring enhanced security and performance. This eliminates the need to expose your service to the public internet, reducing vulnerabilities and safeguarding your data.
๐ Key Benefits of Azure Private Link
โ Azure Private Link offers several key advantages
๐ Private Access to Azure Services: Use private endpoints to connect your virtual network to various Azure services. Providers can host services in their network, and consumers can access them from their own network. The Private Link platform ensures secure connectivity over the Azure backbone network.
๐ Easy Access from On-Premises and Peered Networks: Access Azure services from on-premises environments through ExpressRoute private peering, VPN tunnels, and peered virtual networks using private endpoints. No need for ExpressRoute Microsoft peering or internet traversal, making migration to Azure more secure.
๐ก Data Leakage Protection: Private endpoints map to specific instances of PaaS resources, restricting consumer access to just those resources and preventing access to others in the service. This reduces the risk of data leakage.
๐ Global Connectivity: Connect privately to services in different regions. Your virtual network in one region can connect to services behind Private Link in another region, providing global reach.
๐ Extend Private Link to Your Services: Offer your services privately using Azure Private Link. By placing your service behind an Azure Load Balancer, consumers can connect directly to it through private endpoints in their virtual network. Manage connection requests with an approval process, and enjoy compatibility across different Microsoft Entra tenants.
Ref: Anuradha Samaranayake
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Azure Private Link provides secure access to Azure PaaS services and customer-owned or partner-hosted services via a private endpoint within your virtual network. With Azure Private Link, all traffic between your virtual network and the connected service is routed through Microsoft's backbone network, ensuring enhanced security and performance. This eliminates the need to expose your service to the public internet, reducing vulnerabilities and safeguarding your data.
๐ Key Benefits of Azure Private Link
โ Azure Private Link offers several key advantages
๐ Private Access to Azure Services: Use private endpoints to connect your virtual network to various Azure services. Providers can host services in their network, and consumers can access them from their own network. The Private Link platform ensures secure connectivity over the Azure backbone network.
๐ Easy Access from On-Premises and Peered Networks: Access Azure services from on-premises environments through ExpressRoute private peering, VPN tunnels, and peered virtual networks using private endpoints. No need for ExpressRoute Microsoft peering or internet traversal, making migration to Azure more secure.
๐ก Data Leakage Protection: Private endpoints map to specific instances of PaaS resources, restricting consumer access to just those resources and preventing access to others in the service. This reduces the risk of data leakage.
๐ Global Connectivity: Connect privately to services in different regions. Your virtual network in one region can connect to services behind Private Link in another region, providing global reach.
๐ Extend Private Link to Your Services: Offer your services privately using Azure Private Link. By placing your service behind an Azure Load Balancer, consumers can connect directly to it through private endpoints in their virtual network. Manage connection requests with an approval process, and enjoy compatibility across different Microsoft Entra tenants.
Ref: Anuradha Samaranayake
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆTop 40 AI Tools You Need in 2025! ๐
๐ง Audio
โ Murf AI
โ Descript
โ Voicemaker
โ PlayAI .
โ๏ธ Copywriting
โ Copy.ai
โ Jasper
โ Writesonic
โ Anyword
๐ Logo
โ Looka
โ Namecheap
โ Canva
โ DesignEvolve
๐ Marketing
โ HubSpot
โ Marketo
โ Active Campaign
โ Mailchimp
๐ Productivity
โ Notion
โ ClickUp
โ Asana
โ Trello
๐ Meeting
โ Notta๏ฝAI meeting notes & audio transcription
โ Otter.ai
โ tl;dv - AI Meeting Assistant (tldv.io)
โ Zoom
โ Microsoft Teams
๐ Presentation
โ Canva Presentations
โ Prezi
โ Microsoft PowerPoint
โ Google Slides
๐ฌ Prompts
โ Prompt Perfect
โ GPT-3 Playground
โ AI Dungeon
โ CopyAI Prompts
๐จ Design
โ Figma
โ Adobe XD
โ Sketch
โ Gravit Designer
๐ค Chatbot
โ Kraya
โ Mobile Monkey
โ Landbot
โ ManyChat
Ref: Md Riyazuddin
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ง Audio
โ Murf AI
โ Descript
โ Voicemaker
โ PlayAI .
โ๏ธ Copywriting
โ Copy.ai
โ Jasper
โ Writesonic
โ Anyword
๐ Logo
โ Looka
โ Namecheap
โ Canva
โ DesignEvolve
๐ Marketing
โ HubSpot
โ Marketo
โ Active Campaign
โ Mailchimp
๐ Productivity
โ Notion
โ ClickUp
โ Asana
โ Trello
๐ Meeting
โ Notta๏ฝAI meeting notes & audio transcription
โ Otter.ai
โ tl;dv - AI Meeting Assistant (tldv.io)
โ Zoom
โ Microsoft Teams
๐ Presentation
โ Canva Presentations
โ Prezi
โ Microsoft PowerPoint
โ Google Slides
๐ฌ Prompts
โ Prompt Perfect
โ GPT-3 Playground
โ AI Dungeon
โ CopyAI Prompts
๐จ Design
โ Figma
โ Adobe XD
โ Sketch
โ Gravit Designer
๐ค Chatbot
โ Kraya
โ Mobile Monkey
โ Landbot
โ ManyChat
Ref: Md Riyazuddin
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆReduce Noise in Burp Suite with This Simple Trick! ๐ฅ
๐ก Just add the following patterns in Burp Suite under Proxy > Options > TLS Pass Through:
.*\.google\.com
.*\.gstatic\.com
.*\.googleapis\.com
.*\.pki\.goog
.*\.mozilla\..*
hashtag#bugbounty hashtag#bugbountytip
Ref: Het VikamHet Vikam
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ก Just add the following patterns in Burp Suite under Proxy > Options > TLS Pass Through:
.*\.google\.com
.*\.gstatic\.com
.*\.googleapis\.com
.*\.pki\.goog
.*\.mozilla\..*
hashtag#bugbounty hashtag#bugbountytip
Ref: Het VikamHet Vikam
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆRouting Commands Cheatsheet
โช๏ธโช๏ธโช๏ธโช๏ธโช๏ธโช๏ธโช๏ธโช๏ธโช๏ธโช๏ธโช๏ธโช๏ธ
1. Basic Commands
๐น enable - Privileged mode
๐น configure terminal - Global config mode
๐น interface <int> - Interface config
๐น ip address <ip> <mask> - Assign IP
๐น no shutdown - Enable interface
2. Static Routing
๐น ip route <dest> <mask> <next-hop> - Add static route
๐น show ip route - View routing table
3. RIP Commands
๐น router rip - Enable RIP
๐น network <net> - Add RIP networks
๐น no auto-summary - Disable summarization
4. OSPF Commands
๐น router ospf <id> - Enable OSPF
๐น network <ip> <mask> area <id> - Define OSPF area
๐น show ip ospf neighbor - View neighbors
5. EIGRP Commands
๐น router eigrp <AS> - Enable EIGRP
๐น network <net> - Add networks
๐น no auto-summary - Disable summarization
6. BGP Commands
๐น router bgp <AS> - Enable BGP
๐น neighbor <ip> remote-as <AS> - Add neighbor
๐น show ip bgp summary - View BGP status
7. Troubleshooting
๐น ping <ip> - Test connectivity
๐น traceroute <ip> - Trace packet path
๐น debug ip routing - Debug routing
Ref: Mahesh Girhe
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โช๏ธโช๏ธโช๏ธโช๏ธโช๏ธโช๏ธโช๏ธโช๏ธโช๏ธโช๏ธโช๏ธโช๏ธ
1. Basic Commands
๐น enable - Privileged mode
๐น configure terminal - Global config mode
๐น interface <int> - Interface config
๐น ip address <ip> <mask> - Assign IP
๐น no shutdown - Enable interface
2. Static Routing
๐น ip route <dest> <mask> <next-hop> - Add static route
๐น show ip route - View routing table
3. RIP Commands
๐น router rip - Enable RIP
๐น network <net> - Add RIP networks
๐น no auto-summary - Disable summarization
4. OSPF Commands
๐น router ospf <id> - Enable OSPF
๐น network <ip> <mask> area <id> - Define OSPF area
๐น show ip ospf neighbor - View neighbors
5. EIGRP Commands
๐น router eigrp <AS> - Enable EIGRP
๐น network <net> - Add networks
๐น no auto-summary - Disable summarization
6. BGP Commands
๐น router bgp <AS> - Enable BGP
๐น neighbor <ip> remote-as <AS> - Add neighbor
๐น show ip bgp summary - View BGP status
7. Troubleshooting
๐น ping <ip> - Test connectivity
๐น traceroute <ip> - Trace packet path
๐น debug ip routing - Debug routing
Ref: Mahesh Girhe
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from Exploiting Crew (Pr1vAt3)
Routing Commands Cheatsheet.pdf
266.5 KB
๐ฆVideo - Unpatched Critical Vulnerability in Snapchat's Support System
https://dailycve.com/critical-vulnerability-in-snapchats-support-system-video/
https://dailycve.com/critical-vulnerability-in-snapchats-support-system-video/
DailyCVE
Critical Vulnerability in Snapchat's Support System Video - DailyCVE
Uncovered a significant issue in Snapchatโs Help Center form that allows attackers to send emails using Snapchatโs official support email [โฆ]
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆFree Anti Forensic Techniques Repositories #1
Anti Forensic Techniques
https://lnkd.in/dWmF3ikg
Awesome Anti Forensic by Shadawck
https://lnkd.in/dm2MFpV6
Anti Forensic Techniques by Hacktricks
https://lnkd.in/dimT7PJb
Windows Anti Forensic Script by MikeHorn
https://lnkd.in/d2h39Kg2
Anti Forensic Detection Tool by kuritsutianu
https://lnkd.in/dq4-7T9m
Anti Forensics Tool For Red Teamers by PaulNorman01
https://lnkd.in/d9A7t_Tx
AntiForensic.NET :: Windows anti-forensics made easy by hsheric0210
https://lnkd.in/dMsRJRYR
Anti Forensic Study by CCDCOE
https://lnkd.in/djhFgdqz
Ref: Joas A. Santos
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Anti Forensic Techniques
https://lnkd.in/dWmF3ikg
Awesome Anti Forensic by Shadawck
https://lnkd.in/dm2MFpV6
Anti Forensic Techniques by Hacktricks
https://lnkd.in/dimT7PJb
Windows Anti Forensic Script by MikeHorn
https://lnkd.in/d2h39Kg2
Anti Forensic Detection Tool by kuritsutianu
https://lnkd.in/dq4-7T9m
Anti Forensics Tool For Red Teamers by PaulNorman01
https://lnkd.in/d9A7t_Tx
AntiForensic.NET :: Windows anti-forensics made easy by hsheric0210
https://lnkd.in/dMsRJRYR
Anti Forensic Study by CCDCOE
https://lnkd.in/djhFgdqz
Ref: Joas A. Santos
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
lnkd.in
LinkedIn
This link will take you to a page thatโs not on LinkedIn
๐ฆ๐๐ฎ๐ข๐ฅ๐๐ข๐ง๐ ๐๐๐ ๐๐จ๐ฆ๐ ๐๐๐ :
A Security Operations Center (SOC) is vital for any organization. In this project, I designed and deployed a fully functional SOC home lab using open-source tools: Wazuh, ELK Stack, TheHive, and Cortex.
๐๐๐ฃ๐๐๐ญ๐ข๐ฏ๐๐ฌ :
Ensure proactive monitoring and efficient incident management.
Simulate attack scenarios to test detection and response capabilities.
๐๐ก๐ ๐๐จ๐ซ๐ค๐๐ฅ๐จ๐ฐ :
Wazuh Agents: Collect security data from various systems (Linux and Windows) and send it to the Wazuh Manager.
Wazuh (SIEM): Transfers data via Filebeat to Elasticsearch for storage and analysis.
Kibana: Visualizes data through dashboards with the Wazuh plugin for real-time monitoring.
TheHive (Incident Management Platform): Manages incidents using data from the Wazuh Manager.
Cortex (Automated Analysis Engine): Automates analyses and integrates with VirusTotal for suspicious file evaluation.
SOC Analyst: Utilizes these tools collectively to monitor systems, analyze incidents, and respond effectively to security threats.
๐๐๐ฌ๐ญ๐ข๐ง๐ ๐๐ง๐ ๐๐๐ฌ๐ฎ๐ฅ๐ญ๐ฌ :
To validate the lab's performance, I executed multiple attack scenarios to ensure the tools could detect, analyze, and respond effectively. Example scenarios include:
+ Malware detection: Identifying malicious files and responding appropriately.
+ SQL injection attack detection: Detecting and mitigating database attack attempts.
Thank you Mohamed Benkhirat for you nice content.
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
A Security Operations Center (SOC) is vital for any organization. In this project, I designed and deployed a fully functional SOC home lab using open-source tools: Wazuh, ELK Stack, TheHive, and Cortex.
๐๐๐ฃ๐๐๐ญ๐ข๐ฏ๐๐ฌ :
Ensure proactive monitoring and efficient incident management.
Simulate attack scenarios to test detection and response capabilities.
๐๐ก๐ ๐๐จ๐ซ๐ค๐๐ฅ๐จ๐ฐ :
Wazuh Agents: Collect security data from various systems (Linux and Windows) and send it to the Wazuh Manager.
Wazuh (SIEM): Transfers data via Filebeat to Elasticsearch for storage and analysis.
Kibana: Visualizes data through dashboards with the Wazuh plugin for real-time monitoring.
TheHive (Incident Management Platform): Manages incidents using data from the Wazuh Manager.
Cortex (Automated Analysis Engine): Automates analyses and integrates with VirusTotal for suspicious file evaluation.
SOC Analyst: Utilizes these tools collectively to monitor systems, analyze incidents, and respond effectively to security threats.
๐๐๐ฌ๐ญ๐ข๐ง๐ ๐๐ง๐ ๐๐๐ฌ๐ฎ๐ฅ๐ญ๐ฌ :
To validate the lab's performance, I executed multiple attack scenarios to ensure the tools could detect, analyze, and respond effectively. Example scenarios include:
+ Malware detection: Identifying malicious files and responding appropriately.
+ SQL injection attack detection: Detecting and mitigating database attack attempts.
Thank you Mohamed Benkhirat for you nice content.
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ