Pillaging Data from Private AWS Subnets
Exploiting overly permissive VPC endpoints to exfiltrate data from private AWS subnets
Exploiting overly permissive VPC endpoints to exfiltrate data from private AWS subnets
Checking Bitcoin Seed Phrases for transactions and balances
Simple method to define and build security testing containers in Podman
How to secure a Jellyfin media server
Attacking AWS Accounts from a black box perspective
Using Snotra to Check For Sensitive Tags
Labs to learn penetration testing and offensive security
Swapping from Lightning to Liquid to avoid high on-chain fees when Dollar Cost Averaging (DCA) and swapping back on-chain to obtain fresh private UTXO's
Making Sense of Logging in Azure with Azure Monitor, Diagnostic Settings and Activity Log Alerts
Penetration test reports, aggregating findings and thinking more deeply.
AWS and overly permissive GitHub OIDC cross-account role trust policies
Blog post about Kubernetes Security Fundementals
Blog post about Cloud Configuration Reviews
Configuring a VPN network lock on Fedora with FirewallD for boht host and podman traffic.
Running Windows VMs on Linux with Qemu/KVM and Virtual Machine Manager
How to own an internal domain and pivot into the cloud
Continuous AWS Testing with Snotra, Lambda, Cloud Watch EventBridge and S3.
Fixing issues in common tools with Python ldap3 when connecting to Domain Controllers with LDAP signing and binding enabled.
A series of blog Posts for Claranet Cyber Security about common high impact issues discoverd on internal penetration tests and how to fix them.
Getting Local Administrator access with NTLM Relay attacks against ADCS and RBCD attacks.