Opens profile photo
Follow
sn0int@chaos.social
@sn0int
Semi-automatic OSINT framework for data mining and attack surface enumeration in redteam engagements. Tweets about Rust, Linux, Supply Chain Security at
github.com/kpcyrd/sn0intJoined July 2019

sn0int@chaos.social’s Tweets

Pinned Tweet
Imagine you wrote an OSINT data mining framework but can't figure out the answer to "what did I do yesterday and where did I lock my bicycle??"
2
10
I'm trying to use a k8s replica set to specify "on how many computers should this run on" to exercise my pool of ip addresses, and apparently to tell kubernetes to always prefer a cluster node that has none of my pods yet, I need to write an anti-affinity policy.
2
How to landmine an org that uses the gitlab package registry: The gitlab options {maven,npm,pypi}_package_requests_forwarding all default to on. If you register the org's pkgs on the public registry, their gitlab is going to serve your code if they ever delete their private pkg.
1
Using a pseudonym for your open-source work is mostly about boundaries, if people who aren't paying you want to know your legal name for leverage that's a massive red flag for exploitative behavior 🚩🚩🚩
Quote Tweet
Example format of a "Software Bill Of Materials": ==LiteWMP Workpress Toolkit SBOM== – Linux 5.9 – Apache Httpd 2.3 – 30,000 ideologically-motivated unpaid developers we know only by their usernames like like D3adassPawg69, who can inject code into our solution at any time
1
11
Dear doordash engineers, it could be worse: at least you're not asked to be an opensource worker
Quote Tweet
Since people are tweeting about delivery workers right now: this is how much I made last month delivering food 2 days a week on minimum wage vs how much I made working on opensource 7 days a week (and I'm already blessed it's that high 🙏)
Image
Image
Reminder that all my supply-chain content is now tweeted from this account (even tho there's overlap with offensive security in this one)
Quote Tweet
Would you be interested in a weaponized tool that demonstrates risks of signing-key-abuse for real life update systems, if you happened to have access to the right private keys? #supplychainsecurity
Show this poll
1
There are very similar efforts in the open source world too! Did you know rebuilderd has a channel on the CNCF slack you can join to follow development? Feel free to drop by, ask questions or just say hi! cloud-native.slack.com/messages/rebui
Quote Tweet
Solarwinds stood up today with something to prove, obviously. Yes they implemented in-toto along with Tekton, and how do you validate that your entire build chain wasn't compromised? Run it twice. Using another isolated instance just for deterministic validation. 🤯🔁💰
Show this thread
Image
1
7
Imagine you're trying to infiltrate a private event, got a foolproof(tm) plan for both id checks but security pulls you out for "not being well dressed enough" 👀
1
1
...and done! NYU's Arch Linux rebuilder now generates in-toto attestations. Here's an example: r-b.engineering.nyu.edu/api/v0/builds/
Quote Tweet
VERY excited about this! I'll be updating NYU's rebuilders to generate these attestations. Also, shout out to @qjoyliu for her excellent work on adding in-toto support to rebuilderd as part of @gsoc 2021! twitter.com/sn0int/status/…
10
Really cool stuff 👀 Probably really useful to check if keys of former employees have been properly off-boarded, in case you don't have other means to do so.
Quote Tweet
Another forbidden tool: "ssh-key-confirmer" - Wanted to know if a ssh public key would theoretically be allowed on a SSH target if you had the private key? No worries. Thanks to how SSH works you can test this: github.com/benjojo/ssh-ke
Embedded video
GIF
6