π₯οΈ Understanding the #Linux File System Tree
https://undercodetesting.com/understanding-the-linux-file-system-tree/
@Undercode_testing
https://undercodetesting.com/understanding-the-linux-file-system-tree/
@Undercode_testing
Undercode Testing
Understanding the Linux File System Tree - Undercode Testing
Understanding the Linux File System Tree - "Undercode Testing": Monitor hackers like a pro. Get real-time updates, AI-powered insights, and expert analysis on cybersecurity threats. Go from 0 to hero in staying ahead of hackers.
π¨ Analysis of #PostgreSQL Zero-Day Vulnerability #CVE-2025-1094 and Its Connection to BeyondTrust #CVE-2024-12356
https://undercodetesting.com/analysis-of-postgresql-zero-day-vulnerability-cve-2025-1094-and-its-connection-to-beyondtrust-cve-2024-12356/
@Undercode_testing
https://undercodetesting.com/analysis-of-postgresql-zero-day-vulnerability-cve-2025-1094-and-its-connection-to-beyondtrust-cve-2024-12356/
@Undercode_testing
Undercode Testing
Analysis of PostgreSQL Zero-Day Vulnerability CVE-2025-1094 and Its Connection to BeyondTrust CVE-2024-12356 - Undercode Testing
2025-02-13 Earlier this morning, Rapid7 disclosed CVE-2025-1094, a new zero-day vulnerability in PostgreSQLβs psql component. This discovery was made by [β¦]
β οΈ Unpacking Pyarmor v8+ Scripts: Analyzing a #Malware Campaign
https://undercodetesting.com/unpacking-pyarmor-v8-scripts-analyzing-a-malware-campaign/
@Undercode_testing
https://undercodetesting.com/unpacking-pyarmor-v8-scripts-analyzing-a-malware-campaign/
@Undercode_testing
Undercode Testing
Unpacking Pyarmor v8+ Scripts: Analyzing a Malware Campaign - Undercode Testing
2025-02-13 In a recent collaboration, my colleague Leonard Rapp and I analyzed a sophisticated malware campaign that utilized Pyarmor v8+ [β¦]
π± Alias Mapping and Page Remapping: Bypassing Anti-Cheats with Self-Referencing Page Table Entries
https://undercodetesting.com/alias-mapping-and-page-remapping-bypassing-anti-cheats-with-self-referencing-page-table-entries/
@Undercode_testing
https://undercodetesting.com/alias-mapping-and-page-remapping-bypassing-anti-cheats-with-self-referencing-page-table-entries/
@Undercode_testing
Undercode Testing
Alias Mapping and Page Remapping: Bypassing Anti-Cheats with Self-Referencing Page Table Entries - Undercode Testing
2025-02-13 In the world of low-level system exploitation, one of the most fascinating techniques involves manipulating memory mappings to bypass [β¦]
π‘οΈ #AI and Zero Trust in Cybersecurity: A Deep Dive
https://undercodetesting.com/ai-and-zero-trust-in-cybersecurity-a-deep-dive/
@Undercode_testing
https://undercodetesting.com/ai-and-zero-trust-in-cybersecurity-a-deep-dive/
@Undercode_testing
Undercode Testing
AI and Zero Trust in Cybersecurity: A Deep Dive - Undercode Testing
2025-02-13 In the ever-evolving landscape of cybersecurity, AI and Zero Trust architectures have become critical components in defending against sophisticated [β¦]
π Discovering and Mitigating Vulnerabilities in Opensearch Dashboards
https://undercodetesting.com/discovering-and-mitigating-vulnerabilities-in-opensearch-dashboards/
@Undercode_testing
https://undercodetesting.com/discovering-and-mitigating-vulnerabilities-in-opensearch-dashboards/
@Undercode_testing
Undercode Testing
Discovering and Mitigating Vulnerabilities in Opensearch Dashboards - Undercode Testing
2025-02-13 During a security assessment for a client, I identified a stored Cross-Site Scripting (XSS) vulnerability in Opensearch Dashboards-reporting version [β¦]
π‘οΈ How to Build a Security Operations Center (SOC) - Basic Guide
https://undercodetesting.com/how-to-build-a-security-operations-center-soc-basic-guide/
@Undercode_testing
https://undercodetesting.com/how-to-build-a-security-operations-center-soc-basic-guide/
@Undercode_testing
Undercode Testing
How to Build a Security Operations Center (SOC) - Basic Guide - Undercode Testing
2025-02-13 Building a Security Operations Center (SOC) is a critical step for organizations aiming to enhance their cybersecurity posture. A [β¦]
π‘οΈ Free SIEM Trainings 2025: A Comprehensive Guide to Mastering Security Information and Event Management
https://undercodetesting.com/free-siem-trainings-2025-a-comprehensive-guide-to-mastering-security-information-and-event-management/
@Undercode_testing
https://undercodetesting.com/free-siem-trainings-2025-a-comprehensive-guide-to-mastering-security-information-and-event-management/
@Undercode_testing
Undercode Testing
Free SIEM Trainings 2025: A Comprehensive Guide to Mastering Security Information and Event Management - Undercode Testing
2025-02-13 SIEM (Security Information and Event Management) is a critical component in modern cybersecurity, especially within Security Operations Centers (SOCs). [β¦]
π± Medusa by Dimitrios Valsamaras: A Game-Changer for Mobile Bug Hunters
https://undercodetesting.com/medusa-by-dimitrios-valsamaras-a-game-changer-for-mobile-bug-hunters/
@Undercode_testing
https://undercodetesting.com/medusa-by-dimitrios-valsamaras-a-game-changer-for-mobile-bug-hunters/
@Undercode_testing
Undercode Testing
Medusa by Dimitrios Valsamaras: A Game-Changer for Mobile Bug Hunters - Undercode Testing
2025-02-13 Medusa, developed by Dimitrios Valsamaras, is revolutionizing the field of mobile bug hunting. Powered by FRIDA, this framework automates [β¦]
Understanding the OSI Layers & Protocols
https://undercodetesting.com/understanding-the-osi-layers-protocols/
@Undercode_testing
https://undercodetesting.com/understanding-the-osi-layers-protocols/
@Undercode_testing
Undercode Testing
Understanding the OSI Layers & Protocols - Undercode Testing
2025-02-13 The OSI (Open Systems Interconnection) model is a conceptual framework used to understand and implement standard protocols in network [β¦]
#Github Dorks Generator by Mantas Sabeckis (aka Ott3rly)
https://undercodetesting.com/github-dorks-generator-by-mantas-sabeckis-aka-ott3rly/
@Undercode_testing
https://undercodetesting.com/github-dorks-generator-by-mantas-sabeckis-aka-ott3rly/
@Undercode_testing
Undercode Testing
Github Dorks Generator by Mantas Sabeckis (aka Ott3rly) - Undercode Testing
2025-02-13 The Github Dorks Generator by Mantas Sabeckis (aka Ott3rly) is a powerful tool for cybersecurity professionals and ethical hackers. [β¦]
π¨ #CVE-2025-23369: SAML Authentication Bypass on #GitHub Enterprise Server
https://undercodetesting.com/cve-2025-23369-saml-authentication-bypass-on-github-enterprise-server/
@Undercode_testing
https://undercodetesting.com/cve-2025-23369-saml-authentication-bypass-on-github-enterprise-server/
@Undercode_testing
Undercode Testing
CVE-2025-23369: SAML Authentication Bypass on GitHub Enterprise Server - Undercode Testing
2025-02-13 Just finished my writeup about CVE-2025-23369, an interesting SAML authentication bypass on GitHub Enterprise Server I reported last year. [β¦]
π¨ Bug Bounty Vulnerability: Sensitive Data Exposure - Admin Credentials Leaked
https://undercodetesting.com/bug-bounty-vulnerability-sensitive-data-exposure-admin-credentials-leaked/
@Undercode_testing
https://undercodetesting.com/bug-bounty-vulnerability-sensitive-data-exposure-admin-credentials-leaked/
@Undercode_testing
Undercode Testing
Bug Bounty Vulnerability: Sensitive Data Exposure - Admin Credentials Leaked - Undercode Testing
2025-02-13 In a recent discovery, a critical vulnerability was identified involving the exposure of sensitive data, specifically admin credentials that [β¦]
π‘οΈ Global Cybersecurity Outlook 2025
https://undercodetesting.com/global-cybersecurity-outlook-2025/
@Undercode_testing
https://undercodetesting.com/global-cybersecurity-outlook-2025/
@Undercode_testing
Undercode Testing
Global Cybersecurity Outlook 2025 - Undercode Testing
2025-02-13 Twitter: https://lnkd.in/g_ZhPNse The Global Cybersecurity Outlook 2025 provides a comprehensive look into the evolving landscape of cybersecurity. As threats [β¦]
π‘οΈ Bug Bounty Training Program: A Comprehensive Guide to Cybersecurity
https://undercodetesting.com/bug-bounty-training-program-a-comprehensive-guide-to-cybersecurity/
@Undercode_testing
https://undercodetesting.com/bug-bounty-training-program-a-comprehensive-guide-to-cybersecurity/
@Undercode_testing
Undercode Testing
Bug Bounty Training Program: A Comprehensive Guide to Cybersecurity - Undercode Testing
2025-02-13 π Register here: https://lnkd.in/dJ-dBA4 Table of Content οΏ½ to WAPT & OWASP Top 10 π οΈ Pentest Lab Setup π [β¦]
π Uncovering OAuth App Attacks: A Deep Dive into Malicious Service Principals and Tenants
https://undercodetesting.com/uncovering-oauth-app-attacks-a-deep-dive-into-malicious-service-principals-and-tenants/
@Undercode_testing
https://undercodetesting.com/uncovering-oauth-app-attacks-a-deep-dive-into-malicious-service-principals-and-tenants/
@Undercode_testing
Undercode Testing
Uncovering OAuth App Attacks: A Deep Dive into Malicious Service Principals and Tenants - Undercode Testing
2025-02-13 Matt Kiely, Principal Cybersecurity Researcher at Huntress, has spent six months researching OAuth app attacks, uncovering startling findings across [β¦]
β οΈ #MALWARE ANALYSIS: HOW MINTSLOADER GENERATES RANDOM C2 DOMAINS DYNAMICALLY FOR COMMUNICATION
https://undercodetesting.com/malware-analysis-how-mintsloader-generates-random-c2-domains-dynamically-for-communication/
@Undercode_testing
https://undercodetesting.com/malware-analysis-how-mintsloader-generates-random-c2-domains-dynamically-for-communication/
@Undercode_testing
Undercode Testing
MALWARE ANALYSIS: HOW MINTSLOADER GENERATES RANDOM C2 DOMAINS DYNAMICALLY FOR COMMUNICATION - Undercode Testing
2025-02-13 In early January 2025, researchers identified a malicious campaign involving MintsLoader, a PowerShell-based malware loader. This loader was observed [β¦]
Identify Endpoints with Critical Logged-On Users and Shares with Everyone Permission
https://undercodetesting.com/identify-endpoints-with-critical-logged-on-users-and-shares-with-everyone-permission/
@Undercode_testing
https://undercodetesting.com/identify-endpoints-with-critical-logged-on-users-and-shares-with-everyone-permission/
@Undercode_testing
Undercode Testing
Identify Endpoints with Critical Logged-On Users and Shares with Everyone Permission - Undercode Testing
2025-02-13 This KQL query is designed to identify security risks on endpoints by detecting critical users logged into devices and [β¦]
π‘οΈ Getting Started with #Cisco Firewalls
https://undercodetesting.com/getting-started-with-cisco-firewalls/
@Undercode_testing
https://undercodetesting.com/getting-started-with-cisco-firewalls/
@Undercode_testing
Undercode Testing
Getting Started with Cisco Firewalls - Undercode Testing
2025-02-13 Cisco firewalls are essential for securing network infrastructure. This guide will walk you through the basics of setting up [β¦]