ENIAD – Endpoint, Network, Identity, Application, Data

Overview of ENIAD The ENIAD framework provides a comprehensive approach to cybersecurity by focusing on five critical areas that organizations must protect to ensure a robust security posture. Each component addresses specific aspects of security, enabling organizations to detect, respond to, and mitigate threats effectively. 1. Endpoint Endpoints refer to devices that connect to the Read More …

IAM – Identity and Access Management

Identity and Access Management (IAM) in Amazon Web Services (AWS) is a service that enables users to manage access to AWS resources securely. IAM allows organizations to control who can access specific resources, what actions they can perform, and under what conditions. This is crucial for maintaining security and compliance in cloud environments. Key Features Read More …

Hacker TV – Kerberoasting & Attacks 101

Want to understand how Kerberos works?  Would you like to understand modern Kerberos attacks? Tim Medin walks you through how to attack Kerberos with ticket attacks and Kerberoasting. He covers the basics of Kerberos authentication and then shows you how the trust model can be exploited for persistence, pivoting, and privilege escalation. At the conclusion, Read More …

Notes – AWS Systems Manager Session Manager

Session Manager is a fully managed AWS Systems Manager tool. With Session Manager, you can manage EC2 instances, edge devices, on-premises servers, and VMs. You can use either an interactive one-click browser-based shell or the AWS Command Line Interface. Session Manager provides secure node management without the need to open inbound ports, maintain bastion hosts, Read More …

TMSI – Temporary Mobile Subscriber Identity

  In the world of mobile telecommunications, security and privacy are paramount concerns. One of the key mechanisms used to protect user identities and enhance security is the Temporary Mobile Subscriber Identity (TMSI). For those new to mobile technology, understanding what TMSI is and how it functions can provide valuable insights into how mobile networks Read More …