Semi-automatic OSINT framework for data mining and attack surface enumeration in redteam engagements. Tweets about Rust, Linux, Supply Chain Security at
I'm trying to use a k8s replica set to specify "on how many computers should this run on" to exercise my pool of ip addresses, and apparently to tell kubernetes to always prefer a cluster node that has none of my pods yet, I need to write an anti-affinity policy.
How to landmine an org that uses the gitlab package registry:
The gitlab options {maven,npm,pypi}_package_requests_forwarding all default to on. If you register the org's pkgs on the public registry, their gitlab is going to serve your code if they ever delete their private pkg.
The hardest part of writing a malicious container registry is how fragmented the ecosystem is. Each of these are valid responses when pulling a specific container image by tag.
If you want to explore the attack surface of your target?
You can utilize the sn0int framework, which has different functional modules.
https://github.com/kpcyrd/sn0int
I made a reproducible metasploit package for Arch Linux but I'm slightly hesitant rolling it out to all users immediately because I'm not that familiar with ruby. If you use metasploit and this package works/breaks for you, please let me know! https://pkgbuild.com/~kpcyrd/repro-metasploit/…
Using a pseudonym for your open-source work is mostly about boundaries, if people who aren't paying you want to know your legal name for leverage that's a massive red flag for exploitative behavior 🚩🚩🚩
Example format of a "Software Bill Of Materials":
==LiteWMP Workpress Toolkit SBOM==
– Linux 5.9
– Apache Httpd 2.3
– 30,000 ideologically-motivated unpaid developers we know only by their usernames like like D3adassPawg69, who can inject code into our solution at any time
Since people are tweeting about delivery workers right now: this is how much I made last month delivering food 2 days a week on minimum wage vs how much I made working on opensource 7 days a week (and I'm already blessed it's that high )
I was casually APTing with a friend and revisited the advanced scoping features we've briefly worked on a while ago. They are now more mature in v0.24.0 with the new `rescope` command:
Would you be interested in a weaponized tool that demonstrates risks of signing-key-abuse for real life update systems, if you happened to have access to the right private keys? #supplychainsecurity
sn0int 0.23.0 released, featuring perception-based image hashing for collected images and an option to set a proxy and different default user-agent in `sn0int run`
Just found this on reddit and confirmed it's true for most (but not all) subreddits. I wonder what the implications for #osint/#socmint are, is this better or worse for privacy?
There are very similar efforts in the open source world too! Did you know rebuilderd has a channel on the CNCF slack you can join to follow development? Feel free to drop by, ask questions or just say hi! https://cloud-native.slack.com/messages/rebuilderd/…
Solarwinds stood up today with something to prove, obviously. Yes they implemented in-toto along with Tekton, and how do you validate that your entire build chain wasn't compromised? Run it twice. Using another isolated instance just for deterministic validation.
Imagine you're trying to infiltrate a private event, got a foolproof(tm) plan for both id checks but security pulls you out for "not being well dressed enough" 👀
Introducing code review sundays - one bug at the time!
We are trained in finding bugs in CTF challenges, but what about real software?! That's why we started doing code reviews on a regular basis.
#redteam tip: want to discretely extract credentials from a CI/CD pipeline? open a *draft* pull request.
draft pull requests won't alert repository contributors, but will still trigger pipelines.
#cloudsecurity
VERY excited about this! I'll be updating NYU's rebuilders to generate these attestations.
Also, shout out to @qjoyliu for her excellent work on adding in-toto support to rebuilderd as part of @gsoc 2021! twitter.com/sn0int/status/…
Really cool stuff 👀 Probably really useful to check if keys of former employees have been properly off-boarded, in case you don't have other means to do so.
Another forbidden tool:
"ssh-key-confirmer" - Wanted to know if a ssh public key would theoretically be allowed on a SSH target if you had the private key?
No worries. Thanks to how SSH works you can test this:
https://github.com/benjojo/ssh-key-confirmer…