UNDERCODE TESTING
312 subscribers
311 photos
24 videos
173 files
29.9K links
๐Ÿฆ‘ World first platform which Collect & Analyzes every New hacking method.

+ Free AI Practice.

(New Bug Bounty Methods, Tools Updates, AI & Courses).

โœจ Services: Undercode.help/services

โœจyoutube.com/undercode

@Undercode_Testing
Download Telegram
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘What is Azure Private Link?
Azure Private Link provides secure access to Azure PaaS services and customer-owned or partner-hosted services via a private endpoint within your virtual network. With Azure Private Link, all traffic between your virtual network and the connected service is routed through Microsoft's backbone network, ensuring enhanced security and performance. This eliminates the need to expose your service to the public internet, reducing vulnerabilities and safeguarding your data.

๐ŸŒŸ Key Benefits of Azure Private Link
โœ… Azure Private Link offers several key advantages

๐Ÿ”’ Private Access to Azure Services: Use private endpoints to connect your virtual network to various Azure services. Providers can host services in their network, and consumers can access them from their own network. The Private Link platform ensures secure connectivity over the Azure backbone network.

๐ŸŒ Easy Access from On-Premises and Peered Networks: Access Azure services from on-premises environments through ExpressRoute private peering, VPN tunnels, and peered virtual networks using private endpoints. No need for ExpressRoute Microsoft peering or internet traversal, making migration to Azure more secure.

๐Ÿ›ก Data Leakage Protection: Private endpoints map to specific instances of PaaS resources, restricting consumer access to just those resources and preventing access to others in the service. This reduces the risk of data leakage.

๐ŸŒ Global Connectivity: Connect privately to services in different regions. Your virtual network in one region can connect to services behind Private Link in another region, providing global reach.

๐Ÿ”— Extend Private Link to Your Services: Offer your services privately using Azure Private Link. By placing your service behind an Azure Load Balancer, consumers can connect directly to it through private endpoints in their virtual network. Manage connection requests with an approval process, and enjoy compatibility across different Microsoft Entra tenants.

Ref: Anuradha Samaranayake
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from Exploiting Crew (Pr1vAt3)
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘Top 40 AI Tools You Need in 2025! ๐Ÿš€

๐ŸŽง Audio
โ—• Murf AI
โ—• Descript
โ—• Voicemaker
โ—• PlayAI .

โœ๏ธ Copywriting
โ—• Copy.ai
โ—• Jasper
โ—• Writesonic
โ—• Anyword

๐ŸŒŸ Logo
โ—• Looka
โ—• Namecheap
โ—• Canva
โ—• DesignEvolve

๐Ÿ“ˆ Marketing
โ—• HubSpot
โ—• Marketo
โ—• Active Campaign
โ—• Mailchimp

๐Ÿ“Š Productivity
โ—• Notion
โ—• ClickUp
โ—• Asana
โ—• Trello

๐Ÿ“… Meeting
โ—• Notta๏ฝœAI meeting notes & audio transcription
โ—• Otter.ai
โ—• tl;dv - AI Meeting Assistant (tldv.io)
โ—• Zoom
โ—• Microsoft Teams

๐ŸŽž Presentation
โ—• Canva Presentations
โ—• Prezi
โ—• Microsoft PowerPoint
โ—• Google Slides

๐Ÿ’ฌ Prompts
โ—• Prompt Perfect
โ—• GPT-3 Playground
โ—• AI Dungeon
โ—• CopyAI Prompts

๐ŸŽจ Design
โ—• Figma
โ—• Adobe XD
โ—• Sketch
โ—• Gravit Designer

๐Ÿค– Chatbot
โ—• Kraya
โ—• Mobile Monkey
โ—• Landbot
โ—• ManyChat

Ref: Md Riyazuddin
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
๐Ÿฆ‘Reduce Noise in Burp Suite with This Simple Trick! ๐Ÿ”ฅ

๐Ÿ’ก Just add the following patterns in Burp Suite under Proxy > Options > TLS Pass Through:

.*\.google\.com

.*\.gstatic\.com

.*\.googleapis\.com

.*\.pki\.goog

.*\.mozilla\..*

hashtag#bugbounty hashtag#bugbountytip

Ref: Het VikamHet Vikam
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘Routing Commands Cheatsheet
โ–ช๏ธโ–ช๏ธโ–ช๏ธโ–ช๏ธโ–ช๏ธโ–ช๏ธโ–ช๏ธโ–ช๏ธโ–ช๏ธโ–ช๏ธโ–ช๏ธโ–ช๏ธ

1. Basic Commands

๐Ÿ”น enable - Privileged mode
๐Ÿ”น configure terminal - Global config mode
๐Ÿ”น interface <int> - Interface config
๐Ÿ”น ip address <ip> <mask> - Assign IP
๐Ÿ”น no shutdown - Enable interface

2. Static Routing

๐Ÿ”น ip route <dest> <mask> <next-hop> - Add static route
๐Ÿ”น show ip route - View routing table

3. RIP Commands

๐Ÿ”น router rip - Enable RIP
๐Ÿ”น network <net> - Add RIP networks
๐Ÿ”น no auto-summary - Disable summarization

4. OSPF Commands

๐Ÿ”น router ospf <id> - Enable OSPF
๐Ÿ”น network <ip> <mask> area <id> - Define OSPF area
๐Ÿ”น show ip ospf neighbor - View neighbors

5. EIGRP Commands

๐Ÿ”น router eigrp <AS> - Enable EIGRP
๐Ÿ”น network <net> - Add networks
๐Ÿ”น no auto-summary - Disable summarization

6. BGP Commands

๐Ÿ”น router bgp <AS> - Enable BGP
๐Ÿ”น neighbor <ip> remote-as <AS> - Add neighbor
๐Ÿ”น show ip bgp summary - View BGP status

7. Troubleshooting

๐Ÿ”น ping <ip> - Test connectivity
๐Ÿ”น traceroute <ip> - Trace packet path
๐Ÿ”น debug ip routing - Debug routing

Ref: Mahesh Girhe
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from Exploiting Crew (Pr1vAt3)
Routing Commands Cheatsheet.pdf
266.5 KB
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘Free Anti Forensic Techniques Repositories #1

Anti Forensic Techniques
https://lnkd.in/dWmF3ikg

Awesome Anti Forensic by Shadawck
https://lnkd.in/dm2MFpV6

Anti Forensic Techniques by Hacktricks
https://lnkd.in/dimT7PJb

Windows Anti Forensic Script by MikeHorn
https://lnkd.in/d2h39Kg2

Anti Forensic Detection Tool by kuritsutianu
https://lnkd.in/dq4-7T9m

Anti Forensics Tool For Red Teamers by PaulNorman01
https://lnkd.in/d9A7t_Tx

AntiForensic.NET :: Windows anti-forensics made easy by hsheric0210
https://lnkd.in/dMsRJRYR

Anti Forensic Study by CCDCOE
https://lnkd.in/djhFgdqz

Ref: Joas A. Santos
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
๐Ÿฆ‘๐๐ฎ๐ข๐ฅ๐๐ข๐ง๐  ๐’๐Ž๐‚ ๐‡๐จ๐ฆ๐ž ๐‹๐š๐› :
A Security Operations Center (SOC) is vital for any organization. In this project, I designed and deployed a fully functional SOC home lab using open-source tools: Wazuh, ELK Stack, TheHive, and Cortex.

๐Ž๐›๐ฃ๐ž๐œ๐ญ๐ข๐ฏ๐ž๐ฌ :
Ensure proactive monitoring and efficient incident management.
Simulate attack scenarios to test detection and response capabilities.

๐“๐ก๐ž ๐–๐จ๐ซ๐ค๐Ÿ๐ฅ๐จ๐ฐ :
Wazuh Agents: Collect security data from various systems (Linux and Windows) and send it to the Wazuh Manager.

Wazuh (SIEM): Transfers data via Filebeat to Elasticsearch for storage and analysis.

Kibana: Visualizes data through dashboards with the Wazuh plugin for real-time monitoring.

TheHive (Incident Management Platform): Manages incidents using data from the Wazuh Manager.

Cortex (Automated Analysis Engine): Automates analyses and integrates with VirusTotal for suspicious file evaluation.

SOC Analyst: Utilizes these tools collectively to monitor systems, analyze incidents, and respond effectively to security threats.

๐“๐ž๐ฌ๐ญ๐ข๐ง๐  ๐š๐ง๐ ๐‘๐ž๐ฌ๐ฎ๐ฅ๐ญ๐ฌ :
To validate the lab's performance, I executed multiple attack scenarios to ensure the tools could detect, analyze, and respond effectively. Example scenarios include:
+ Malware detection: Identifying malicious files and responding appropriately.
+ SQL injection attack detection: Detecting and mitigating database attack attempts.

Thank you Mohamed Benkhirat for you nice content.


@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–