AWS Notes – AWS Pentesting

An Opinionated Ramp Up Guide to AWS Pentesting https://awssecuritydigest.com/articles/opinionated-ramp-up-guide-to-aws-pentesting https://medium.com/@MorattiSec/my-aws-pentest-methodology-14c333b7fb58 Understanding the Shared Responsibility Model https://www.wiz.io/academy/shared-responsibility-model fwd:cloudsec https://fwdcloudsec.org/ AWS Customer Support Policy for Penetration Testing https://aws.amazon.com/security/penetration-testing/ Also, read this and follow the AWS pentesting rules. Cloud Tests One is a review of the external facing posture, which you can consider adjacent to a traditional External Read More …

Open AI’s – 20th Century Blue Masters

The 20th century saw the rise of many influential blues musicians who shaped the genre and left a lasting impact on music history. Some notable figures include: Robert Johnson – Often regarded as the most influential blues musician of all time, known for his haunting vocals and intricate guitar playing. Songs like “Cross Road Blues” Read More …

I am new to Investing

So all of the folks of wisdom say that the stock market always goes up in the long run, although with plenty of unpredictable bumps along the way. Since you can’t predict those bumps until after they happen, there is no point in trying to dance in and out of it. In other words, the Read More …

What is SEO Poisoning?

SEO Poisoning (or Search Engine Optimization Poisoning) is a type of social engineering attack that targets an unsuspecting user, or maybe someone who is in a hurry and not paying close attention.  These are typically used by bad guys to fool unsuspecting users into clicking their links and going to the wrong website, or worse Read More …

Notes :: Getting around some Defenses

Trying to read up on this for some work things. Dropping a few links here. Will add more notes as I go on. —————————————————————— bypassing-cylance-and-other-avs-edrs-by-unhooking-windows-apis “”” It’s worth noting that not all the functions get hijacked by AVs/EDRs. Usually only those functions that are known to be abused over and over again in the wiled that Read More …