AZ 900 – Part II – Architecture & Security II

Microsoft Azure is a powerful cloud computing platform that provides a wide range of services and resources for building, deploying, and managing applications and services through Microsoft-managed data centers. Understanding the structure of Azure is essential for effectively utilizing its capabilities. Key components of Azure’s organizational structure include subscriptions, management groups, resource groups, and resources. Read More …

AZ 900 – Part II – Architecture & Security I

Microsoft Azure is a comprehensive cloud computing platform that provides a wide range of services, including computing power, storage, networking, databases, analytics, and more. Understanding its global infrastructure involves several key concepts: Regions and Availability Zones Regions: Azure is divided into geographic regions, which are clusters of data centers located in specific areas around the Read More …

Decoupling CI/CD from deployment

Decoupling CI/CD from deployment allows teams to build, test, and deploy code changes independently, offering more flexibility and control over releases, enabling faster feedback loops and risk reduction. Why Decouple? Improved Control and Stability: By separating deployment (moving the code to production) from release (making the code available to users), teams can deploy new versions of Read More …

TLS: How It Protects Your Data Online

In today’s interconnected world, ensuring the security of data during online communication is essential. Transport Layer Security (TLS) is a foundational protocol that helps protect the privacy and integrity of data exchanged over the internet. This article will briefly explain what TLS is, how it works, and why it is critical for safe online communication. Read More …

TMSI – Temporary Mobile Subscriber Identity

  In the world of mobile telecommunications, security and privacy are paramount concerns. One of the key mechanisms used to protect user identities and enhance security is the Temporary Mobile Subscriber Identity (TMSI). For those new to mobile technology, understanding what TMSI is and how it functions can provide valuable insights into how mobile networks Read More …

Quick Note :: Attribute Based Access

We then end up with two main classifications of access control: Role-Based Access Control (RBAC). Define the role for the access to data, eg Policy = Subject (AND/OR) Role –> Permissions. Attribute-Based Access Control (ABCL). Define attributes eg Policy = User (role, nationality) AND/OR Resource (department, owner) AND/OR Action AND/OR Context (time, IP, location) -> Read More …

Hacker Video – SIEGECAST: Kerberoasting & Attacks 101

Want to understand how Kerberos works? Would you like to understand modern Kerberos attacks? Tim Media walks you through how to attack Kerberos with ticket attacks and Kerberoasting. He covers the basics of Kerberos authentication and then shows you how the trust model can be exploited for persistence, pivoting, and privilege escalation. At the conclusion, Read More …

EDRKillShifter

“EDRKillShifter” is a type of malware specifically designed to disable Endpoint Detection and Response (EDR) security software on a system, allowing attackers to carry out malicious activities like deploying ransomware without detection; it is considered a sophisticated tool often used by cybercriminals to evade security measures. Key points about EDRKillShifter: Function: Its primary purpose is Read More …

How to change user agent in nmap

NMAP How to change user agent You can find the default value in /usr/share/nmap/nselib/http.lua (At the beginning of the file, a couple of lines after the comments) local USER_AGENT = stdnse.get_script_args(‘http.useragent’) or “Mozilla/5.0 (compatible; Nmap Scripting Engine; http://nmap.org/book/nse.html)” You can change the value with this line local USER_AGENT = stdnse.get_script_args(‘http.useragent’) or “Mozilla/5.0 (compatible; MSIE 9.0; Read More …