UNDERCODE TESTING
312 subscribers
311 photos
24 videos
173 files
29.9K links
๐Ÿฆ‘ World first platform which Collect & Analyzes every New hacking method.

+ Free AI Practice.

(New Bug Bounty Methods, Tools Updates, AI & Courses).

โœจ Services: Undercode.help/services

โœจyoutube.com/undercode

@Undercode_Testing
Download Telegram
๐Ÿฆ‘ ๐’๐ฎ๐ฉ๐ž๐ซ๐œ๐ก๐š๐ซ๐ ๐ž ๐˜๐จ๐ฎ๐ซ ๐‚๐ฒ๐›๐ž๐ซ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐‚๐š๐ซ๐ž๐ž๐ซ ๐ข๐ง ๐Ÿ๐ŸŽ๐Ÿ๐Ÿ“: ๐…๐‘๐„๐„ ๐“๐ซ๐š๐ข๐ง๐ข๐ง๐  ๐‘๐ž๐ฌ๐จ๐ฎ๐ซ๐œ๐ž๐ฌ! ๐Ÿš€

Looking to boost your IT and Cybersecurity skills?

This mega-list of FREE resources is your gateway to success! While some links might require a quick search, the knowledge gained will be invaluable. I've organized these resources by category for easier navigation, making your learning journey smoother and more efficient.


๐‚๐ž๐ซ๐ญ๐ข๐Ÿ๐ข๐œ๐š๐ญ๐ข๐จ๐ง๐ฌ:
๐‚๐จ๐ฆ๐ฉ๐“๐ˆ๐€ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ+: https://lnkd.in/gyFy_CG9 A foundational security certification.

๐‚๐ˆ๐’๐’๐: https://lnkd.in/gUFjihpJ For experienced security professionals.


๐Š๐ž๐ฒ ๐’๐ค๐ข๐ฅ๐ฅ ๐€๐ซ๐ž๐š๐ฌ:
๐ƒ๐š๐ญ๐š๐›๐š๐ฌ๐ž๐ฌ: https://lnkd.in/gWQmYwib Learn the essentials of data management.

๐๐ž๐ง๐ž๐ญ๐ซ๐š๐ญ๐ข๐จ๐ง ๐“๐ž๐ฌ๐ญ๐ข๐ง๐ : https://lnkd.in/gAdgyY6h Develop ethical hacking skills.

๐–๐ž๐› ๐€๐ฉ๐ฉ๐ฅ๐ข๐œ๐š๐ญ๐ข๐จ๐ง ๐“๐ž๐ฌ๐ญ๐ข๐ง๐ : https://lnkd.in/g5FkXWej Secure web applications from vulnerabilities.


๐‡๐š๐ง๐๐ฌ-๐จ๐ง ๐๐ซ๐š๐œ๐ญ๐ข๐œ๐ž:
๐‡๐š๐œ๐ค๐“๐ก๐ž๐๐จ๐ฑ ๐’๐ž๐ซ๐ข๐ž๐ฌ & ๐‡๐š๐œ๐ค๐ข๐ง๐  ๐•๐ข๐๐ž๐จ๐ฌ: https://lnkd.in/gztivT-D Apply your skills in a virtual environment.

๐๐ž๐ญ๐ฐ๐จ๐ซ๐ค ๐’๐ข๐ฆ๐ฎ๐ฅ๐š๐ญ๐ข๐จ๐ง: https://lnkd.in/gRMak7_x Build and test network configurations.

๐•๐ข๐ซ๐ญ๐ฎ๐š๐ฅ๐ข๐ณ๐š๐ญ๐ข๐จ๐ง: https://lnkd.in/gFkyFVvF Experiment with different operating systems and software.

๐‚๐š๐ฉ๐ญ๐ฎ๐ซ๐ž ๐“๐ก๐ž ๐…๐ฅ๐š๐  (๐‚๐“๐…): ๐“๐ž๐ฌ๐ญ ๐ฒ๐จ๐ฎ๐ซ ๐ฌ๐ค๐ข๐ฅ๐ฅ๐ฌ ๐ข๐ง ๐ญ๐ก๐ž๐ฌ๐ž ๐ข๐ง๐ญ๐ž๐ซ๐š๐œ๐ญ๐ข๐ฏ๐ž ๐œ๐ก๐š๐ฅ๐ฅ๐ž๐ง๐ ๐ž๐ฌ.
https://lnkd.in/gpnYs5Qj
https://www.vulnhub.com/
https://lnkd.in/gn2AEYhw
https://lnkd.in/g5FkXWej


๐Ž๐ฉ๐ž๐ซ๐š๐ญ๐ข๐ง๐  ๐’๐ฒ๐ฌ๐ญ๐ž๐ฆ๐ฌ:
๐‹๐ข๐ง๐ฎ๐ฑ: ๐„๐ฑ๐ฉ๐ฅ๐จ๐ซ๐ž ๐ฏ๐š๐ซ๐ข๐จ๐ฎ๐ฌ ๐๐ข๐ฌ๐ญ๐ซ๐ข๐›๐ฎ๐ญ๐ข๐จ๐ง๐ฌ.
https://lnkd.in/g2M__A5n
https://lnkd.in/gyc4R_F7
https://lnkd.in/gSiHYRNg
https://lnkd.in/g5GsUT7H
https://lnkd.in/g7KJBUYd
https://lnkd.in/gUK8PU4p

๐Œ๐ข๐œ๐ซ๐จ๐ฌ๐จ๐Ÿ๐ญ:
https://lnkd.in/gP3nxKpZ

๐–๐ข๐ง๐๐จ๐ฐ๐ฌ ๐’๐ž๐ซ๐ฏ๐ž๐ซ: Gain server administration expertise.
https://lnkd.in/gWUTmN-5
https://lnkd.in/gsWZQnwj


๐๐ซ๐จ๐ ๐ซ๐š๐ฆ๐ฆ๐ข๐ง๐  ๐‹๐š๐ง๐ ๐ฎ๐š๐ ๐ž๐ฌ:
๐๐ฒ๐ญ๐ก๐จ๐ง: https://lnkd.in/g_NpsqEM A versatile language for scripting and automation.

๐†๐จ๐ฅ๐š๐ง๐ : https://lnkd.in/gmwz4ed5 A powerful language for system programming.


๐๐ž๐ญ๐ฐ๐จ๐ซ๐ค๐ข๐ง๐ :
https://lnkd.in/gNm8RhtS
https://lnkd.in/ghqw2sHZ
https://lnkd.in/g4fp8WFa Understand network fundamentals and security.

Ref: Adnan Alam
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from UNDERCODE CEH NOTES
๐Ÿฆ‘Companies that specialize in gathering online intelligence
from both public and private sources:

โ€ข InsideView (https://www.insideview.com)

โ€ข NewsEdge (www.newsedge.com)

โ€ข Semantic Visions (www.semantic-visions.com)

โ€ข DigitalGlobe (www.digitalglobe.com)

โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
This media is not supported in your browser
VIEW IN TELEGRAM
An interesting active new evasion technique that is bypassing almost all security solutions so far, taking advantage of the recovery functionality in applications. This is groundbreaking as most if not all endpoint solutions arenโ€™t armed with any file recovery techniques and would fail to detect this attack vector.

Microsoft has structured word documents similar to archives, constructing any doc file with 3 sections; starting with local file headers, central file headers and end directory records. These 3 sections are linked backward starting from the end to the header. Manipulating any of these sections makes it harder for any endpoint or email security solution to unpack and identify the issue, but recoverable by its intending application after its too late.

VirusTotal:
https://www.virustotal.com/gui/file/3245ca6c7f9f78e6b8fc0f05e7821e4b4e0d1abf24719d9457a7640f3f447c58/details
๐Ÿฆ‘The following payloads are all valid e-mail addresses. we can use those payloads in our bug bounty journey

REf: Zlatan H.
UNDERCODE TESTING
2025_ceh_notes.pdf
๐Ÿฆ‘Essential Study Notes for CEH (Certified Ethical Hacker) Certification ๐Ÿ“š

The Certified Ethical Hacker (CEH) certification is a benchmark for anyone looking to excel in ethical hacking and cybersecurity. To help you on your journey, hereโ€™s a detailed overview of what youโ€™ll learn with these CEH study notes:

๐Ÿ›  Key Topics Covered:

1๏ธโƒฃ Footprinting and Reconnaissance: Learn how attackers gather information about a target system and how to counteract it.
2๏ธโƒฃ Scanning Networks: Understand the tools and techniques used to identify vulnerabilities in networks.
3๏ธโƒฃ Gaining Access: Dive into methods attackers use to exploit vulnerabilities and how to mitigate them.
4๏ธโƒฃ Maintaining Access: Discover how attackers establish backdoors and how to detect and eliminate them.
5๏ธโƒฃ Covering Tracks: Learn methods used by attackers to hide their activity and how to uncover these traces.
6๏ธโƒฃ Malware Threats: Get insights into Trojans, viruses, worms, and other forms of malware.
7๏ธโƒฃ Social Engineering: Explore techniques used to exploit human vulnerabilities and how to safeguard against them.
8๏ธโƒฃ Web Application Security: Understand how web applications are exploited and the measures needed to secure them.
9๏ธโƒฃ Wireless Network Security: Learn about Wi-Fi vulnerabilities and secure configurations.
๐Ÿ”Ÿ Tools & Frameworks: Master the use of tools like Metasploit, Nmap, Burp Suite, and more.

๐Ÿง  Why CEH Notes are Important:
โ€ข Concise and Exam-Focused: Designed to help you grasp key concepts quickly.
โ€ข Real-World Relevance: Learn tactics used by ethical hackers in real scenarios.
โ€ข Practical Guidance: Tips for applying concepts to real-life cybersecurity challenges.

๐Ÿ“ˆ Benefits of Studying CEH:
โ€ข Build foundational skills in penetration testing.
โ€ข Enhance your understanding of cybersecurity defense strategies.
โ€ข Gain recognition in the industry with a globally respected certification.

Ref: in pdf
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
๐Ÿฆ‘ These Microsoft Labs are an excellent way to deepen your knowledge and boost your exam readiness!

๐Ÿ”น Enroll for the Azure Administrator AZ-104 Practice Test with Labs
๐Ÿงช https://lnkd.in/dJcSggXB

๐Ÿ”น Course AZ-104T00
๐Ÿ”น 96-Hour Course
๐Ÿงช Course Link: https://lnkd.in/ds32UBjW
๐Ÿ”น Practice Test with Labs
๐Ÿงช https://lnkd.in/dtPYNDef

๐Ÿ”น Manage Azure Entra ID Identities
๐Ÿงช https://lnkd.in/diDaDxjX

๐Ÿ”น Manage Subscriptions and RBAC
๐Ÿงช https://lnkd.in/dmuqpxUJ

๐Ÿ”น Manage Governance via Azure Policy
๐Ÿงช https://lnkd.in/di3iBw6h

๐Ÿ”น Manage Azure Resources by using the Azure Portal
๐Ÿงช https://lnkd.in/d9V2h2xd

๐Ÿ”น Manage Azure resources by using Azure Resource Manage Templates
๐Ÿงช https://lnkd.in/dGnVX6dM

๐Ÿ”น Manage Azure Resources by using Azure PowerShell
๐Ÿงช https://lnkd.in/dGS_V9St

๐Ÿ”น Manage Azure resources by using the Azure CLI
๐Ÿงช https://lnkd.in/dqvrkGhY

๐Ÿ”น Implement Virtual networking
๐Ÿงช https://lnkd.in/d6yejKdB

๐Ÿ”น Implement inter site Connectivity
๐Ÿงช https://lnkd.in/dCGARJFp

๐Ÿ”น Implement Traffic management
๐Ÿงช https://lnkd.in/dWJDZ4HD

๐Ÿ”น Manage Azure Storage
๐Ÿงช https://lnkd.in/dbmGjkTi

Ref: Anuradha Samaranayake
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
๐Ÿฆ‘ThievingFox - Remotely retrieving credentials from password managers and Windows utilities:

https://lnkd.in/dfXhpv_D
UNDERCODE TESTING
GIF
๐Ÿฆ‘One of the visualization tools that can help in detecting anomalies in large amounts of data that you may not know!

If you are in the cybersecurity field, you know the importance of analyzing large volumes of log data.. ๐Ÿ˜ฎโ€๐Ÿ’จ

This tool is an open-source visualization software designed to interactively explore and understand massive amounts of tabular data!

๐’๐ช๐ฎ๐ž๐ฒ

๐Ÿ”นIt gives users an detailed yet intuitive multi-view representation of column-oriented data and can ingest from:
- Structured text files (CSV, logs, ...)
- Apache Parquet files
- Pcap files
- SQL databases
- Elasticsearch databases

๐Ÿ”น It delivers value through its VISU approach:
- Visualize: Leverage various visual representations of raw data in combination with statistics.
- Investigate: Use filters to build an accurate understanding of millions of rows while switching instantly between capturing the big picture and focusing on the details.
- Spot the Unknown: As a structured understanding of the data emerges, identify unknowns and anomalies.

๐Ÿ”น It can be used for many different purposes, such as:
Cybersecurity (to detect attacks and data leaks), BI and Big Data, IT troubleshooting, and Machine Learning.

๐Ÿ”— To download: squey[.]org/download/
๐Ÿ”— Documentation: doc[.]squey[.]org

๐Ÿ”ด If you want my advice, I would recommend installing it and solve a network forensics (PCAP file) challenge, to have an idea about it first ๐Ÿ˜‰

๐Ÿ”ดNote: To install it on Windows, you need to have installed and enabled WSL2.

Ref: Shbib
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
๐Ÿฆ‘2025 FREE Certification Courses!

No Fee, No Subscription, No Registration Required, Just Start Learning.
These Courses Includes Video Lectures, Tutorial and Easy Notes.
All courses are from the Microsoft Learn platform.
Microsoft Learn
.

1-Microsoft Azure Administrator
- Course AZ-104T00
- Course Link: https://lnkd.in/dUEGRTgq

2-Configuring and Operating Microsoft Azure Virtual Desktop
- Course AZ-140
- Course Link: https://lnkd.in/dWCUPjTC

3-Designing Microsoft Azure Infrastructure Solutions
- Course AZ-305T00
- Course Link: https://lnkd.in/dmvHyJ_z

4-Developing Solutions for Microsoft Azure
- Course AZ-204T00
- Course Link:https://lnkd.in/dtfBZBN6

5-Designing and Implementing Microsoft DevOps solutions
- Course AZ-400T00
- Course Link:https://lnkd.in/drCiHKgM

6-Designing and Implementing a Microsoft Azure AI Solution
- Course AI-102T00
- Course Link: https://lnkd.in/ducvr87J

7-Develop Generative AI Solutions with Azure OpenAI Service
- Course AI-050T00
- Course Link: https://lnkd.in/dJFW_PgR

8- Microsoft Security, Compliance, and Identity Fundamentals
- Course SC-900T00
- Course Link: https://lnkd.in/dRgx4EKG

9- Data Engineering on Microsoft Azure
- Course DP-203T00
- Course Link: https://lnkd.in/dSU6QmgT

10-Microsoft Security Operations Analyst
- Course SC-200T00
- Course Link: https://lnkd.in/d2EYRJph

11- Designing and Implementing Microsoft Azure Networking Solutions
- Course AZ-700T00
- Course Link: https://lnkd.in/dhDBjPaK

12-Designing and implementing a data science solution on Azure
- Course DP-100T01
- Course Link: https://lnkd.in/dUsB4GS6

13-Administering Microsoft Azure SQL Solutions
- Course DP-300T00
- Course Link:https://lnkd.in/d-5CzTDz

14-Microsoft Cybersecurity Architect
- Course SC-100T00
- Course Link: https://lnkd.in/dRhNSNsQ

15-Microsoft Azure Security Technologies
- Course AZ-500T00
- Course Link:https://lnkd.in/dPARyEZB

16-Azure Support Engineer Troubleshooting Azure Connectivity
- Course AZ-720T00
- Course Link: https://lnkd.in/d87-6RmC

17-Administering Windows Server Hybrid Core Infrastructure
- Course AZ-800T00
- Course Link:https://lnkd.in/dimC-puE

18-Configuring Windows Server Hybrid Advanced Services
- Course AZ-801T00
-Course Link:https://lnkd.in/dmXNAtP5

Ref: Shahzad MS
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Media is too big
VIEW IN TELEGRAM
๐Ÿฆ‘ Bypassing CrowdStrike EDR with Hookchain and Custom Shellcode ๐Ÿšจ

๐Ÿ” Key Points:
- Utilizing the Hookchain technique for evasion of detection.
- Designing custom shellcode for discreet execution.
- Illustrating the necessity for robust detection methods surpassing traditional EDR capabilities.

This experiment sheds light on critical vulnerabilities that sophisticated attackers could exploit, emphasizing the significance of embracing multi-layered security approaches.

๐Ÿ›ก๏ธ Disclaimer: This exploration serves solely for educational purposes, aiming to deepen comprehension of EDR bypass strategies for enhanced defense mechanisms. The primary objective? Strengthening cybersecurity infrastructures.

Ref: Ammar. A
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
๐Ÿฆ‘Broken Access Control: From Password Reset to Mass Account Takeover

A critical vulnerability in the password reset functionality of an API endpoint (/api/u/resetPwd). Hereโ€™s how it unfolded:

1๏ธโƒฃ The endpoint accepts a username parameter and sends a password reset link to the user's email.
2๏ธโƒฃ The use of "u" in the endpoint (u=user) hinted that other roles like admin (a=admin) or superuser (su) might exist.
3๏ธโƒฃ Attempts to reset admin passwords via /api/admin/resetPwd and /api/administrator/resetPwd failed.
4๏ธโƒฃ However, /api/su/resetPwd worked, allowing me to reset the superuser password!
5๏ธโƒฃ The reset mechanism generated predictable passwords like username + ab12*. For example, resetting for admin resulted in adminab12*.

๐ŸŽฏ Impact: This flaw allowed unauthorized access to critical accounts, leading to mass account takeover.

Ref: Amit Kumar
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–