🔷 OneDrive to Enum Them All
TrustedSec researchers have discovered a OneDrive enumeration vulnerability that could allow an attacker to discover the email addresses of OneDrive users. You can also refer to the companion tool.
https://www.trustedsec.com/blog/onedrive-to-enum-them-all
#azure
TrustedSec researchers have discovered a OneDrive enumeration vulnerability that could allow an attacker to discover the email addresses of OneDrive users. You can also refer to the companion tool.
https://www.trustedsec.com/blog/onedrive-to-enum-them-all
#azure
👍3❤2🔥2👏1
🔶 7 lesser-known AWS SSM Document techniques for code execution
A deep dive into AWS SSM Run Command shows that there are multiple documents attackers can use for executing code remotely on EC2 instances.
https://securitycafe.ro/2023/04/19/7-lesser-known-aws-ssm-document-techniques-for-code-execution
#aws
A deep dive into AWS SSM Run Command shows that there are multiple documents attackers can use for executing code remotely on EC2 instances.
https://securitycafe.ro/2023/04/19/7-lesser-known-aws-ssm-document-techniques-for-code-execution
#aws
🔥3👍2❤1👏1
🔶 We reported a security issue in AWS CDK's eks.Cluster component
Two sleuthing SREs uncovered an AWS security issue. Here's how they found it, why it matters, and what you need to do to resolve it.
https://garden.io/blog/aws-security-issue
#aws
Two sleuthing SREs uncovered an AWS security issue. Here's how they found it, why it matters, and what you need to do to resolve it.
https://garden.io/blog/aws-security-issue
#aws
❤2👍1🔥1
🔶 Scaling Authorization with Cedar and OPAL
A practical tutorial to build a comprehensive Cedar-based application authorization system.
https://www.permit.io/blog/scaling-authorization-with-cedar-and-opal
#aws
A practical tutorial to build a comprehensive Cedar-based application authorization system.
https://www.permit.io/blog/scaling-authorization-with-cedar-and-opal
#aws
🔥2👍1😱1
🔶 Implementing machine-to-machine authentication for services behind an AWS ALB with OIDC
Post delving into the possibilities of enforcing machine-to-machine (m2m) authentication using OIDC (OpenID Connect) at a high level when utilizing an AWS ALB.
https://medium.com/@hettiarachchi.yashodha/enforcing-machine-to-machine-authentication-for-services-behind-an-aws-alb-part-2-e06707e6f366
(use VPN to open from Russia)
#aws
Post delving into the possibilities of enforcing machine-to-machine (m2m) authentication using OIDC (OpenID Connect) at a high level when utilizing an AWS ALB.
https://medium.com/@hettiarachchi.yashodha/enforcing-machine-to-machine-authentication-for-services-behind-an-aws-alb-part-2-e06707e6f366
(use VPN to open from Russia)
#aws
👍2❤1🔥1👏1
🔶 Messing Around With AWS Batch For Privilege Escalations
How to achieve privilege escalation via misconfigured AWS Batch.
https://blog.doyensec.com/2023/06/13/messing-around-with-aws-batch-for-privilege-escalations.html
#aws
How to achieve privilege escalation via misconfigured AWS Batch.
https://blog.doyensec.com/2023/06/13/messing-around-with-aws-batch-for-privilege-escalations.html
#aws
🔥2👍1😱1
🔶 AWS API Gateway header smuggling and cache confusion
Post diving into two potential security issues identified in AWS API Gateway authorizers.
https://securityblog.omegapoint.se/en/writeup-apigw
#aws
Post diving into two potential security issues identified in AWS API Gateway authorizers.
https://securityblog.omegapoint.se/en/writeup-apigw
#aws
👍4❤1🔥1
🔶 Spotted: How we discovered Privilege Escalation, missing CloudTrail data and a race condition in AWS Directory Service
A set of bugs in AWS Directory Service. One of them could be used for privilege escalation by an authenticated user with sufficient permissions.
https://cloudar.be/awsblog/spotted-privilege-escalation-in-aws-directory-service
#aws
A set of bugs in AWS Directory Service. One of them could be used for privilege escalation by an authenticated user with sufficient permissions.
https://cloudar.be/awsblog/spotted-privilege-escalation-in-aws-directory-service
#aws
🔥2👍1🤔1
🔶 AWS Pentest Methodology
A high-level methodology of how one could conduct a penetration test inside the AWS platform.
https://medium.com/@MorattiSec/my-aws-pentest-methodology-14c333b7fb58
(use VPN to open from Russia)
#aws
A high-level methodology of how one could conduct a penetration test inside the AWS platform.
https://medium.com/@MorattiSec/my-aws-pentest-methodology-14c333b7fb58
(use VPN to open from Russia)
#aws
❤4👍1🔥1
This media is not supported in your browser
VIEW IN TELEGRAM
🔶 Really cool illustration demonstrating some AWS services
🌍 Amazon CloudFront
🌐 Amazon Route 53
💻 Amazon EC2
⚖️ Amazon Autoscaling
🪪 Amazon Certificate Manager
🪣 Amazon Backup service
🗄️ Amazon RDS
☁️ Amazon VPC
🔐 Amazon WAF
👁️ Amazon CloudWatch
https://www.linkedin.com/posts/nelsonamigoscode_aws-devops-awsdevops-activity-7076823493127884800-AN5_?utm_source=share&utm_medium=member_ios
(use VPN to open from Russia)
#aws
🌍 Amazon CloudFront
🌐 Amazon Route 53
💻 Amazon EC2
⚖️ Amazon Autoscaling
🪪 Amazon Certificate Manager
🪣 Amazon Backup service
🗄️ Amazon RDS
☁️ Amazon VPC
🔐 Amazon WAF
👁️ Amazon CloudWatch
https://www.linkedin.com/posts/nelsonamigoscode_aws-devops-awsdevops-activity-7076823493127884800-AN5_?utm_source=share&utm_medium=member_ios
(use VPN to open from Russia)
#aws
🔥4❤2👍1
🔴 Analyzing Volatile Memory on a Google Kubernetes Engine Node
Post explaining in detail how memory analysis works and how it can be used on any GKE node in production today.
https://engineering.atspotify.com/2023/06/analyzing-volatile-memory-on-a-google-kubernetes-engine-node
#gcp
Post explaining in detail how memory analysis works and how it can be used on any GKE node in production today.
https://engineering.atspotify.com/2023/06/analyzing-volatile-memory-on-a-google-kubernetes-engine-node
#gcp
👍4🔥2😱1
🔶 CloudGoat Vulnerable Lambda Scenario - Part 2 (Response)
As an incident responder, walk through how we can investigate and resolve an ongoing attack targeting CloudGoat's vulnerable Lambda scenario.
https://0xdeadbeefjerky.com/posts/cloudgoat-lambda-walkthrough-part-2
#aws
As an incident responder, walk through how we can investigate and resolve an ongoing attack targeting CloudGoat's vulnerable Lambda scenario.
https://0xdeadbeefjerky.com/posts/cloudgoat-lambda-walkthrough-part-2
#aws
👍3❤1🔥1
🔷 nOAuth: How Microsoft OAuth Misconfiguration Can Lead to Full Account Takeover
An implementation flaw discovered in Microsoft Azure AD OAuth applications that, when exploited, could lead to full account takeover.
https://www.descope.com/blog/post/noauth
(use VPN to open from Russia)
#azure
An implementation flaw discovered in Microsoft Azure AD OAuth applications that, when exploited, could lead to full account takeover.
https://www.descope.com/blog/post/noauth
(use VPN to open from Russia)
#azure
👍2🔥2❤1
🔶 AWS CloudTrail cheat sheet
An attempt to document CloudTrail events that are "interesting" for incident responders or detection engineers.
https://invictus-ir.medium.com/aws-cloudtrail-cheat-sheet-dcf2b92e37e2
(use VPN to open from Russia)
#aws
An attempt to document CloudTrail events that are "interesting" for incident responders or detection engineers.
https://invictus-ir.medium.com/aws-cloudtrail-cheat-sheet-dcf2b92e37e2
(use VPN to open from Russia)
#aws
👍4🔥1🤔1
🔶 AWS announces Software Bill of Materials export capability in Amazon Inspector
Amazon Inspector now offers the ability to export a consolidated Software Bill of Materials (SBOMs) for all Amazon Inspector monitored resources across your organization in industry standard formats, including CycloneDx and SPDX.
https://aws.amazon.com/ru/about-aws/whats-new/2023/06/software-bill-materials-export-capability-amazon-inspector
#aws
Amazon Inspector now offers the ability to export a consolidated Software Bill of Materials (SBOMs) for all Amazon Inspector monitored resources across your organization in industry standard formats, including CycloneDx and SPDX.
https://aws.amazon.com/ru/about-aws/whats-new/2023/06/software-bill-materials-export-capability-amazon-inspector
#aws
🔥3👍2❤1
🔶 AWS WAF Clients Left Vulnerable to SQL Injection Due to Unorthodox MSSQL Design Choice
While doing research on Microsoft SQL (MSSQL) Server, a GoSecure ethical hacker found an unorthodox design choice that ultimately led to a web application firewall (WAF) bypass.
https://www.gosecure.net/blog/2023/06/21/aws-waf-clients-left-vulnerable-to-sql-injection-due-to-unorthodox-mssql-design-choice
#aws
While doing research on Microsoft SQL (MSSQL) Server, a GoSecure ethical hacker found an unorthodox design choice that ultimately led to a web application firewall (WAF) bypass.
https://www.gosecure.net/blog/2023/06/21/aws-waf-clients-left-vulnerable-to-sql-injection-due-to-unorthodox-mssql-design-choice
#aws
👍3❤2🔥1
🔶 How to get rid of AWS access keys - Part 2: Reducing Privileges
How to reduce the privileges of AWS access keys in order to mitigate their risk.
https://www.wiz.io/blog/how-to-get-rid-of-aws-access-keys-part-2
#aws
How to reduce the privileges of AWS access keys in order to mitigate their risk.
https://www.wiz.io/blog/how-to-get-rid-of-aws-access-keys-part-2
#aws
👍3🔥3👏1
🔶🔷🔴 8 Terraform continuous validation use cases for AWS, Google Cloud, and Azure
How to use Terraform "check" blocks and continuous validation with AWS, Google Cloud, and Azure services.
https://www.hashicorp.com/blog/8-terraform-continuous-validation-use-cases-for-aws-google-cloud-and-azure
#aws #azure #gcp
How to use Terraform "check" blocks and continuous validation with AWS, Google Cloud, and Azure services.
https://www.hashicorp.com/blog/8-terraform-continuous-validation-use-cases-for-aws-google-cloud-and-azure
#aws #azure #gcp
👍2🔥2❤1
🔶 Leveraging AWS SSO (aka Identity Center) with Google Workspaces
A Better way to configure AWS Identity Center to use Google Workspace/Cloud Identity with SCIM Support.
https://www.primeharbor.com/blog/aws-identity-center-google-v2
#aws
A Better way to configure AWS Identity Center to use Google Workspace/Cloud Identity with SCIM Support.
https://www.primeharbor.com/blog/aws-identity-center-google-v2
#aws
👍4🔥2😱1
🔴 How to migrate sensitive data with confidence using Google Cloud's CDMC-certified architecture
New and existing Google Cloud customers can migrate their sensitive data to the cloud with greater confidence thanks to the newly CDMC-certified architecture.
https://cloud.google.com/blog/products/identity-security/how-to-migrate-sensitive-data-using-google-clouds-cdmc-certified-architecture
#gcp
New and existing Google Cloud customers can migrate their sensitive data to the cloud with greater confidence thanks to the newly CDMC-certified architecture.
https://cloud.google.com/blog/products/identity-security/how-to-migrate-sensitive-data-using-google-clouds-cdmc-certified-architecture
#gcp
👍3🔥2😱1
🔶 Sometimes What Sounds Benign Can Bite You: An Unexpected Implication of Lambda Privileges
Granting a user the unconstrained permission to update Lambda function code in an AWS account can have unexpected, possibly severe, consequences under certain conditions that might not be obvious on first pass.
https://ermetic.com/blog/aws/sometimes-what-sounds-benign-can-bite-you-an-unexpected-implication-of-lambda-privileges
#aws
Granting a user the unconstrained permission to update Lambda function code in an AWS account can have unexpected, possibly severe, consequences under certain conditions that might not be obvious on first pass.
https://ermetic.com/blog/aws/sometimes-what-sounds-benign-can-bite-you-an-unexpected-implication-of-lambda-privileges
#aws
🔥3❤1👍1