Bucket Monopoly: Breaching AWS Accounts Through Shadow Resources https://www.aquasec.com/blog/bucket-monopoly-breaching-aws-accounts-through-shadow-resources/ Capturing Exposed AWS Keys During Dynamic Web Application Tests https://www.praetorian.com/blog/capturing-exposed-aws-keys-during-dynamic-web-application-tests/ AWS Network Firewall egress filtering can be easily bypassed https://canglad.com/blog/2023/aws-network-firewall-egress-filtering-can-be-easily-bypassed/
Hacker Video – SIEGECAST: Kerberoasting & Attacks 101
Want to understand how Kerberos works? Would you like to understand modern Kerberos attacks? Tim Media walks you through how to attack Kerberos with ticket attacks and Kerberoasting. He covers the basics of Kerberos authentication and then shows you how the trust model can be exploited for persistence, pivoting, and privilege escalation. At the conclusion, Read More …
Low Literacy Rates in the USA
a.k.a. Idiocracy is coming This bit of blog snark is from this post : 54% of American Adults Read Below 6th Grade-Levels. Medium is going to make you sign up for at least a free account in order for you to read the whole article. Yeah! /snark I have no idea why the Marxist was Read More …
powershell code – Find computers
To find a single machine and the date it last logged on Get-ADComputer -identity SRV-DB01 -Properties * | FT Name, LastLogonDate -Autosize Find all the machines Get-ADComputer -Filter * -Properties * | FT Name, LastLogonDate -Autosize
News :: AT&T Breached again…..
article Another example of sprawling clouds maybe? Security 101 – You have to know what you have. /snark over
NOTES :: Purdue Model
The Purdue Model The Purdue model is generally accepted as the standard for building an industrial control system (ICS) network architecture in a way that supports OT security, separating the layers of the network to maintain a hierarchical flow of data between them, and as such, reflects the baseline architecture requirements for many industrial control Read More …
Hacker Video – What Is An XXE Attack
XML files can incorporate inline references to other documents. Unsafe treatment of external references allows an attacker to probe your file system for sensitive information – an XML External Entity (XXE) attack.
Unmasking a CIA Criminal
Hacker video of the week……
Changes in net worth of Congress Critters
Brought to you by Open Secrets. Just because I like to read the site. For the first time in history, the majority of America’s elected officials in Washington, D.C. are millionaires. At the same time, 50 percent of Americans cannot afford to spend $5,000 in an emergency. For many people that number is even lower. Read More …
Good Morning Girls
Good Morning Girls #pollo #urbanhomesteading #pollodecocciónenelairelibre #timelapse #chicago #pollosdepatio #granjaurbana #cámaraenelpatio #pollosdechicago #mediooeste #granjaurbanaenelmediooeste #granjaillinois #chicken #urbanhomesteading #freerangechicken #timelapse #chicago #backyardchickens #backyardhomesteading #backyardcam #chicagochickens #midwest #midwesturbanhomestead #illinoishomestead #citylife #homesteadbeginner #outdoorchickens #vidaurbana #principianteengranja #pollosalairelibre