UNDERCODE TESTING
312 subscribers
311 photos
24 videos
173 files
29.9K links
๐Ÿฆ‘ World first platform which Collect & Analyzes every New hacking method.

+ Free AI Practice.

(New Bug Bounty Methods, Tools Updates, AI & Courses).

โœจ Services: Undercode.help/services

โœจyoutube.com/undercode

@Undercode_Testing
Download Telegram
๐Ÿฆ‘๐๐ฎ๐ข๐ฅ๐๐ข๐ง๐  ๐’๐Ž๐‚ ๐‡๐จ๐ฆ๐ž ๐‹๐š๐› :
A Security Operations Center (SOC) is vital for any organization. In this project, I designed and deployed a fully functional SOC home lab using open-source tools: Wazuh, ELK Stack, TheHive, and Cortex.

๐Ž๐›๐ฃ๐ž๐œ๐ญ๐ข๐ฏ๐ž๐ฌ :
Ensure proactive monitoring and efficient incident management.
Simulate attack scenarios to test detection and response capabilities.

๐“๐ก๐ž ๐–๐จ๐ซ๐ค๐Ÿ๐ฅ๐จ๐ฐ :
Wazuh Agents: Collect security data from various systems (Linux and Windows) and send it to the Wazuh Manager.

Wazuh (SIEM): Transfers data via Filebeat to Elasticsearch for storage and analysis.

Kibana: Visualizes data through dashboards with the Wazuh plugin for real-time monitoring.

TheHive (Incident Management Platform): Manages incidents using data from the Wazuh Manager.

Cortex (Automated Analysis Engine): Automates analyses and integrates with VirusTotal for suspicious file evaluation.

SOC Analyst: Utilizes these tools collectively to monitor systems, analyze incidents, and respond effectively to security threats.

๐“๐ž๐ฌ๐ญ๐ข๐ง๐  ๐š๐ง๐ ๐‘๐ž๐ฌ๐ฎ๐ฅ๐ญ๐ฌ :
To validate the lab's performance, I executed multiple attack scenarios to ensure the tools could detect, analyze, and respond effectively. Example scenarios include:
+ Malware detection: Identifying malicious files and responding appropriately.
+ SQL injection attack detection: Detecting and mitigating database attack attempts.

Thank you Mohamed Benkhirat for you nice content.


@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
๐Ÿฆ‘OnionGPT - Have fun! ๐Ÿ˜

OnionGPT - Have fun! ๐Ÿ˜ http://oniongpt6lntsoztgylhju7nmqedlq6fjexe55z327lmxyae3nutlyad.onion/
๐Ÿฆ‘LinkedIn is offering ๐Ÿ๐Ÿ ๐…๐‘๐„๐„ ๐จ๐ง๐ฅ๐ข๐ง๐ž ๐œ๐จ๐ฎ๐ซ๐ฌ๐ž๐ฌ

๐๐จ ๐๐š๐ฒ๐ฆ๐ž๐ง๐ญ ๐๐ž๐ž๐๐ž๐! โŒ

This course will help you learn practical, relevant skills anytime, anywhere.

1. Artificial Intelligence Foundations: Machine Learning
โ†’ 6 chapter quizzes
โ†’ Access on tablet and phone
๐Ÿ”— https://lnkd.in/giN__2xU


2. Learning Python
โ†’ Easy and powerful programming language
โ†’ Suitable for all skill levels
๐Ÿ”— https://lnkd.in/gDPg4b_h


3. Learn Cloud Computing
โ†’ Overview of cloud computing concepts
โ†’ Key for business migration to the cloud
๐Ÿ”— https://lnkd.in/gYjt4U7S


4. Blockchain Basics
โ†’ Learn the fundamentals of blockchain
โ†’ Understand its impact on interactions
๐Ÿ”— https://lnkd.in/gYjt4U7S


5. Strategic Thinking
โ†’ 3 chapter quizzes
โ†’ Access on tablet and phone
๐Ÿ”— https://lnkd.in/gYFHybyp


6. Selling to Executives
โ†’ Skills to sell effectively to executives
โ†’ Enhance communication strategies
๐Ÿ”— https://lnkd.in/g9uS7DRc


7. Digital Marketing Tools and Services
โ†’ Essential tools for digital marketing
โ†’ Expert guidance for business growth
๐Ÿ”— https://lnkd.in/gPqdmCZ4


8. Affiliate Marketing Foundations
โ†’ Key knowledge for affiliate marketing
โ†’ Tips for starting and growing a business
๐Ÿ”— https://lnkd.in/gRa-P6fX


9. Learning Video Production and Editing
โ†’ Skills for video production and editing
โ†’ Relevant for the digital age
๐Ÿ”— https://lnkd.in/gnuDAcCG


10. Excel: Tips and Tricks
โ†’ Tips and shortcuts for Excel
โ†’ Enhance productivity with advanced features
๐Ÿ”— https://lnkd.in/gnuDAcCG


11. Time Management Fundamentals
โ†’ Techniques for effective time management
โ†’ Boost personal productivity
๐Ÿ”— https://lnkd.in/gSqMudqW


12. Public Speaking Foundations
โ†’ Build essential public speaking skills
โ†’ Gain confidence in presentations
๐Ÿ”— https://lnkd.in/ghYsekSK


Ref: Altiam Kabir
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Media is too big
VIEW IN TELEGRAM
๐Ÿฆ‘Windows Defender Bypass Using DSViper, Meterpreter, and HAVOC C2.
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿฆ‘Vid CVE 2024 49112 - LdapNightmare by SafeBreach-Labs
sam.pdf
29.4 MB
Basics of Switching Routing Firewall & Wireless
๐Ÿฆ‘ ๐’๐ฎ๐ฉ๐ž๐ซ๐œ๐ก๐š๐ซ๐ ๐ž ๐˜๐จ๐ฎ๐ซ ๐‚๐ฒ๐›๐ž๐ซ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐‚๐š๐ซ๐ž๐ž๐ซ ๐ข๐ง ๐Ÿ๐ŸŽ๐Ÿ๐Ÿ“: ๐…๐‘๐„๐„ ๐“๐ซ๐š๐ข๐ง๐ข๐ง๐  ๐‘๐ž๐ฌ๐จ๐ฎ๐ซ๐œ๐ž๐ฌ! ๐Ÿš€

Looking to boost your IT and Cybersecurity skills?

This mega-list of FREE resources is your gateway to success! While some links might require a quick search, the knowledge gained will be invaluable. I've organized these resources by category for easier navigation, making your learning journey smoother and more efficient.


๐‚๐ž๐ซ๐ญ๐ข๐Ÿ๐ข๐œ๐š๐ญ๐ข๐จ๐ง๐ฌ:
๐‚๐จ๐ฆ๐ฉ๐“๐ˆ๐€ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ+: https://lnkd.in/gyFy_CG9 A foundational security certification.

๐‚๐ˆ๐’๐’๐: https://lnkd.in/gUFjihpJ For experienced security professionals.


๐Š๐ž๐ฒ ๐’๐ค๐ข๐ฅ๐ฅ ๐€๐ซ๐ž๐š๐ฌ:
๐ƒ๐š๐ญ๐š๐›๐š๐ฌ๐ž๐ฌ: https://lnkd.in/gWQmYwib Learn the essentials of data management.

๐๐ž๐ง๐ž๐ญ๐ซ๐š๐ญ๐ข๐จ๐ง ๐“๐ž๐ฌ๐ญ๐ข๐ง๐ : https://lnkd.in/gAdgyY6h Develop ethical hacking skills.

๐–๐ž๐› ๐€๐ฉ๐ฉ๐ฅ๐ข๐œ๐š๐ญ๐ข๐จ๐ง ๐“๐ž๐ฌ๐ญ๐ข๐ง๐ : https://lnkd.in/g5FkXWej Secure web applications from vulnerabilities.


๐‡๐š๐ง๐๐ฌ-๐จ๐ง ๐๐ซ๐š๐œ๐ญ๐ข๐œ๐ž:
๐‡๐š๐œ๐ค๐“๐ก๐ž๐๐จ๐ฑ ๐’๐ž๐ซ๐ข๐ž๐ฌ & ๐‡๐š๐œ๐ค๐ข๐ง๐  ๐•๐ข๐๐ž๐จ๐ฌ: https://lnkd.in/gztivT-D Apply your skills in a virtual environment.

๐๐ž๐ญ๐ฐ๐จ๐ซ๐ค ๐’๐ข๐ฆ๐ฎ๐ฅ๐š๐ญ๐ข๐จ๐ง: https://lnkd.in/gRMak7_x Build and test network configurations.

๐•๐ข๐ซ๐ญ๐ฎ๐š๐ฅ๐ข๐ณ๐š๐ญ๐ข๐จ๐ง: https://lnkd.in/gFkyFVvF Experiment with different operating systems and software.

๐‚๐š๐ฉ๐ญ๐ฎ๐ซ๐ž ๐“๐ก๐ž ๐…๐ฅ๐š๐  (๐‚๐“๐…): ๐“๐ž๐ฌ๐ญ ๐ฒ๐จ๐ฎ๐ซ ๐ฌ๐ค๐ข๐ฅ๐ฅ๐ฌ ๐ข๐ง ๐ญ๐ก๐ž๐ฌ๐ž ๐ข๐ง๐ญ๐ž๐ซ๐š๐œ๐ญ๐ข๐ฏ๐ž ๐œ๐ก๐š๐ฅ๐ฅ๐ž๐ง๐ ๐ž๐ฌ.
https://lnkd.in/gpnYs5Qj
https://www.vulnhub.com/
https://lnkd.in/gn2AEYhw
https://lnkd.in/g5FkXWej


๐Ž๐ฉ๐ž๐ซ๐š๐ญ๐ข๐ง๐  ๐’๐ฒ๐ฌ๐ญ๐ž๐ฆ๐ฌ:
๐‹๐ข๐ง๐ฎ๐ฑ: ๐„๐ฑ๐ฉ๐ฅ๐จ๐ซ๐ž ๐ฏ๐š๐ซ๐ข๐จ๐ฎ๐ฌ ๐๐ข๐ฌ๐ญ๐ซ๐ข๐›๐ฎ๐ญ๐ข๐จ๐ง๐ฌ.
https://lnkd.in/g2M__A5n
https://lnkd.in/gyc4R_F7
https://lnkd.in/gSiHYRNg
https://lnkd.in/g5GsUT7H
https://lnkd.in/g7KJBUYd
https://lnkd.in/gUK8PU4p

๐Œ๐ข๐œ๐ซ๐จ๐ฌ๐จ๐Ÿ๐ญ:
https://lnkd.in/gP3nxKpZ

๐–๐ข๐ง๐๐จ๐ฐ๐ฌ ๐’๐ž๐ซ๐ฏ๐ž๐ซ: Gain server administration expertise.
https://lnkd.in/gWUTmN-5
https://lnkd.in/gsWZQnwj


๐๐ซ๐จ๐ ๐ซ๐š๐ฆ๐ฆ๐ข๐ง๐  ๐‹๐š๐ง๐ ๐ฎ๐š๐ ๐ž๐ฌ:
๐๐ฒ๐ญ๐ก๐จ๐ง: https://lnkd.in/g_NpsqEM A versatile language for scripting and automation.

๐†๐จ๐ฅ๐š๐ง๐ : https://lnkd.in/gmwz4ed5 A powerful language for system programming.


๐๐ž๐ญ๐ฐ๐จ๐ซ๐ค๐ข๐ง๐ :
https://lnkd.in/gNm8RhtS
https://lnkd.in/ghqw2sHZ
https://lnkd.in/g4fp8WFa Understand network fundamentals and security.

Ref: Adnan Alam
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from UNDERCODE CEH NOTES
๐Ÿฆ‘Companies that specialize in gathering online intelligence
from both public and private sources:

โ€ข InsideView (https://www.insideview.com)

โ€ข NewsEdge (www.newsedge.com)

โ€ข Semantic Visions (www.semantic-visions.com)

โ€ข DigitalGlobe (www.digitalglobe.com)

โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
This media is not supported in your browser
VIEW IN TELEGRAM
An interesting active new evasion technique that is bypassing almost all security solutions so far, taking advantage of the recovery functionality in applications. This is groundbreaking as most if not all endpoint solutions arenโ€™t armed with any file recovery techniques and would fail to detect this attack vector.

Microsoft has structured word documents similar to archives, constructing any doc file with 3 sections; starting with local file headers, central file headers and end directory records. These 3 sections are linked backward starting from the end to the header. Manipulating any of these sections makes it harder for any endpoint or email security solution to unpack and identify the issue, but recoverable by its intending application after its too late.

VirusTotal:
https://www.virustotal.com/gui/file/3245ca6c7f9f78e6b8fc0f05e7821e4b4e0d1abf24719d9457a7640f3f447c58/details