๐ถ Abusing Amazon VPC CNI plugin for Kubernetes
The article discusses a security vulnerability in the Amazon VPC CNI plugin, used by Amazon EKS. The flaw allows an attacker to move laterally to other VPCs in the AWS account.
https://www.elttam.com/blog/amazon-vpc-cni/
#aws
The article discusses a security vulnerability in the Amazon VPC CNI plugin, used by Amazon EKS. The flaw allows an attacker to move laterally to other VPCs in the AWS account.
https://www.elttam.com/blog/amazon-vpc-cni/
#aws
๐2โค1๐ฅ1
๐ถ Orca Security's journey to a petabyte-scale data lake with Apache Iceberg and AWS Analytics
Orca Security shares their experience in building a petabyte-scale data lake using Apache Iceberg and AWS services.
https://aws.amazon.com/ru/blogs/big-data/orca-securitys-journey-to-a-petabyte-scale-data-lake-with-apache-iceberg-and-aws-analytics/
#aws
Orca Security shares their experience in building a petabyte-scale data lake using Apache Iceberg and AWS services.
https://aws.amazon.com/ru/blogs/big-data/orca-securitys-journey-to-a-petabyte-scale-data-lake-with-apache-iceberg-and-aws-analytics/
#aws
๐3๐ฅ1๐1
๐ถ How to get rid of AWS access keys - Part 3: Replacing the authentication
Post discussing alternative solutions to using access keys.
https://www.wiz.io/blog/how-to-get-rid-of-aws-access-keys-part-3
#aws
Post discussing alternative solutions to using access keys.
https://www.wiz.io/blog/how-to-get-rid-of-aws-access-keys-part-3
#aws
๐3โค1๐ฅ1
๐ถ Refuting AWS Chain Attack - Digging Deeper into EKS Zero Day claims
An analysis of the findings published by a security researcher last month, claiming to have uncovered zero days in thousands of EKS cluster.
https://kloudle.com/blog/refuting-aws-chain-attack-digging-deeper-into-eks-zero-days-claim/
#aws
An analysis of the findings published by a security researcher last month, claiming to have uncovered zero days in thousands of EKS cluster.
https://kloudle.com/blog/refuting-aws-chain-attack-digging-deeper-into-eks-zero-days-claim/
#aws
๐2๐ฅ2๐1
๐ถ No keys attached: Exploring GitHub-to-AWS keyless authentication flaws
While popular, GitHub-to-AWS keyless authentication mechanisms can be insecurely configured.
https://securitylabs.datadoghq.com/articles/exploring-github-to-aws-keyless-authentication-flaws/
#aws
While popular, GitHub-to-AWS keyless authentication mechanisms can be insecurely configured.
https://securitylabs.datadoghq.com/articles/exploring-github-to-aws-keyless-authentication-flaws/
#aws
๐2๐ฅ2๐1
๐ถ Swiping right on the AWS WAF CAPTCHA challenge
Post walking through a methodology for beating the AWS WAF CAPTCHA challenges programmatically.
https://onecloudplease.com/blog/swiping-right-on-the-aws-waf-captcha-challenge
#aws
Post walking through a methodology for beating the AWS WAF CAPTCHA challenges programmatically.
https://onecloudplease.com/blog/swiping-right-on-the-aws-waf-captcha-challenge
#aws
๐2๐ฅ2๐1
๐ถ๐ท๐ด Hijacking Cloud CI/CD Systems for Fun and Profit
This research details a new technique that can be used by threat actors for supply chain attacks on open-source repositories using GCP, Azure and AWS.
https://divyanshu-mehta.gitbook.io/researchs/hijacking-cloud-ci-cd-systems-for-fun-and-profit
#aws #azure #gcp
This research details a new technique that can be used by threat actors for supply chain attacks on open-source repositories using GCP, Azure and AWS.
https://divyanshu-mehta.gitbook.io/researchs/hijacking-cloud-ci-cd-systems-for-fun-and-profit
#aws #azure #gcp
๐ฅ3โค1๐1๐1
๐ถAWS Networking Concepts
A mind map to link together all the different networking-related concepts from AWS.
https://miparnisariblog.wordpress.com/2023/03/29/aws-networking-concepts/
#aws
A mind map to link together all the different networking-related concepts from AWS.
https://miparnisariblog.wordpress.com/2023/03/29/aws-networking-concepts/
#aws
๐4๐ฅ2๐1
๐ถ Automated First-Response in AWS using Sigma and Athena
Can Sigma rules provide first-response capabilities in a post-compromised AWS environment?
https://invictus-ir.medium.com/automated-first-response-in-aws-using-sigma-and-athena-615940bedc56
(Use VPN to open from Russia)
#aws
Can Sigma rules provide first-response capabilities in a post-compromised AWS environment?
https://invictus-ir.medium.com/automated-first-response-in-aws-using-sigma-and-athena-615940bedc56
(Use VPN to open from Russia)
#aws
๐4๐ฅ3๐1
๐ท Microsoft Entra Workload ID - Introduction and Delegated Permissions
Post providing an overview about some aspects and features which are important in delegating management of Workload ID in Microsoft Entra: Who can see and create apps? Why you should avoid assigning owners to service principals or application objects?
https://www.cloud-architekt.net/entra-workload-id-introduction-and-delegation
#azure
Post providing an overview about some aspects and features which are important in delegating management of Workload ID in Microsoft Entra: Who can see and create apps? Why you should avoid assigning owners to service principals or application objects?
https://www.cloud-architekt.net/entra-workload-id-introduction-and-delegation
#azure
๐4๐ฅ1๐ฑ1
๐ถ More on Abusing the Amazon Web Services SSM Agent as a Remote Access Trojan
This blog lays out a new potential post-exploitation technique: Abusing AWS Systems Manager (SSM) agent so that it functions as a Remote Access Trojan (RAT) on both Linux and Windows machines, while using an attacker AWS account as a Command and Control (C&C).
https://www.mitiga.io/blog/abusing-the-amazon-web-services-ssm-agent-as-a-remote-access-trojan
#aws
This blog lays out a new potential post-exploitation technique: Abusing AWS Systems Manager (SSM) agent so that it functions as a Remote Access Trojan (RAT) on both Linux and Windows machines, while using an attacker AWS account as a Command and Control (C&C).
https://www.mitiga.io/blog/abusing-the-amazon-web-services-ssm-agent-as-a-remote-access-trojan
#aws
๐3๐ฅ2๐1
๐ด Signing URLs in GCP: Convenience vs. Security
Why the "iam.serviceAccounts.signBlob" permission can cause trouble in your GCP environment.
https://lsgeurope.com/post/signing-urls-in-gcp-convenience-vs-security
#gcp
Why the "iam.serviceAccounts.signBlob" permission can cause trouble in your GCP environment.
https://lsgeurope.com/post/signing-urls-in-gcp-convenience-vs-security
#gcp
๐3๐ฅ1๐1
๐ถ Perform continuous vulnerability scanning of AWS Lambda functions with Amazon Inspector
Activate Amazon Inspector within one or more AWS accounts, and be notified when a vulnerability is detected in an AWS Lambda function.
https://aws.amazon.com/ru/blogs/security/perform-continuous-vulnerability-scanning-of-aws-lambda-functions-with-amazon-inspector/
#aws
Activate Amazon Inspector within one or more AWS accounts, and be notified when a vulnerability is detected in an AWS Lambda function.
https://aws.amazon.com/ru/blogs/security/perform-continuous-vulnerability-scanning-of-aws-lambda-functions-with-amazon-inspector/
#aws
๐4๐ฅ2โค1
๐ถ Configure fine-grained access to your resources shared using AWS Resource Access Manager
You can use AWS Resource Access Manager (AWS RAM) to securely, simply, and consistently share supported resource types within your organization or organizational units (OUs) and across AWS accounts.
https://aws.amazon.com/ru/blogs/security/configure-fine-grained-access-to-your-resources-shared-using-aws-resource-access-manager/
#aws
You can use AWS Resource Access Manager (AWS RAM) to securely, simply, and consistently share supported resource types within your organization or organizational units (OUs) and across AWS accounts.
https://aws.amazon.com/ru/blogs/security/configure-fine-grained-access-to-your-resources-shared-using-aws-resource-access-manager/
#aws
๐3โค1๐ฅ1
๐ท Unauthorized Access to Cross-Tenant Applications in Microsoft Power Platform
A researcher at Tenable has discovered an issue that enables limited, unauthorized access to cross-tenant applications and sensitive data (including but not limited to authentication secrets).
https://www.tenable.com/security/research/tra-2023-25
(Use VPN to open from Russia)
#azure
A researcher at Tenable has discovered an issue that enables limited, unauthorized access to cross-tenant applications and sensitive data (including but not limited to authentication secrets).
https://www.tenable.com/security/research/tra-2023-25
(Use VPN to open from Russia)
#azure
โค1๐1๐ฅ1
๐ท Knocking on the Front Door (client side desync attack on Azure CDN)
A write-up on a Browser-Powered Desync bug discovered in the Azure CDN service known as Front Door.
https://blog.jeti.pw/posts/knocking-on-the-front-door
#azure
A write-up on a Browser-Powered Desync bug discovered in the Azure CDN service known as Front Door.
https://blog.jeti.pw/posts/knocking-on-the-front-door
#azure
๐1๐ฅ1๐1
๐ถ Hacking Github AWS integrations again
Another post looking at the perils of unproperly scoping access provided by OIDC.
https://dagrz.com/writing/aws-security/hacking-github-aws-oidc
#aws
Another post looking at the perils of unproperly scoping access provided by OIDC.
https://dagrz.com/writing/aws-security/hacking-github-aws-oidc
#aws
๐ฅ2โค1๐1
๐ถ AWS Security Monitoring in 2023: Untangle the chaos
This post provides recommendations for implementing an effective security monitoring strategy in AWS.
https://marbot.io/blog/2023-08-04-aws-security-monitoring-in-2023.html
#aws
This post provides recommendations for implementing an effective security monitoring strategy in AWS.
https://marbot.io/blog/2023-08-04-aws-security-monitoring-in-2023.html
#aws
๐4๐ฅ1๐ฑ1
๐ถ SSRF Tricks - Thread
Some tricks ยซrhynoraterยป picked up over the past 5 years of web app testing.
https://x.com/rhynorater/status/1689400476452679682?s=52&t=J3j_Bp59pI4rfliKITPeZQ
(Use VPN to open from Russia)
#aws
Some tricks ยซrhynoraterยป picked up over the past 5 years of web app testing.
https://x.com/rhynorater/status/1689400476452679682?s=52&t=J3j_Bp59pI4rfliKITPeZQ
(Use VPN to open from Russia)
#aws
๐4โค1๐ฅ1๐ฑ1
๐ท An Azure Tale of VPN, Conditional Access and MFA Bypass
A walkthrough review of the implementation of an on-prem VPN server that used Azure AD as the idP and enforced MFA via conditional access policies.
https://simondotsh.com/infosec/2023/08/15/azure-tale-vpn-ca-mfa-bypass.html
#azure
A walkthrough review of the implementation of an on-prem VPN server that used Azure AD as the idP and enforced MFA via conditional access policies.
https://simondotsh.com/infosec/2023/08/15/azure-tale-vpn-ca-mfa-bypass.html
#azure
๐3๐ฅ1๐1