PinnedPublished inInfoSec Write-upsEnumeration and lateral movement in GCP environmentsThis write up is about a pentest we did in which we managed to compromise a hybrid GCP hosted infrastructure using native GCP tools for…Jun 1, 2022Jun 1, 2022
Published inInfoSec Write-upsArchitecture of a ransomware (2/2)In part 1(https://securityshenaningans.medium.com/architecture-of-a-ransomware-1-2-1b9fee757fcb) we explained key concepts necessary to…Nov 26, 2020Nov 26, 2020
Published inInfoSec Write-upsArchitecture of a ransomware (1/2)Last couple of months we’ve seen a rise in ransomware related incidents, mostly due to the increase of remote work COVID-19. Nevertheless…Nov 24, 20201Nov 24, 20201
Published inInfoSec Write-upsRecipe for a successful phishing campaign (part 2/2)Recap: In part 1 we saw general considerations you should keep in mind in order to start setting up your infrastructure…Oct 15, 2020Oct 15, 2020
Published inInfoSec Write-upsRecipe for a successful phishing campaign (part 1/2)IntroductionOct 13, 2020Oct 13, 2020
Published inInfoSec Write-upsExploiting AWS IAM permissions for total cloud compromise: a real world example (part 2/2)IntroductionOct 1, 2020Oct 1, 2020
Published inInfoSec Write-upsExploiting fine-grained AWS IAM permissions for total cloud compromise: a real world example (part…IntroductionSep 29, 2020Sep 29, 2020
Published inInfoSec Write-upsAWS IAM explained for Red and Blue teamsIntroductionSep 24, 20201Sep 24, 20201
Published inInfoSec Write-upsCombining Hadoop and MCollective for total network compromiseThis is the story of how only two insecure configurations allowed us to take down an entire cloud hosted company. It was a gray box…Sep 22, 2020Sep 22, 2020
Published inInfoSec Write-upsHow a badly configured DB allowed us to own an entire cloud of over 25K hosts (part 2/2)On part 1 we briefly explained how we got administrator privileges to almost all BMC devices hosting a native Openstack cloud. In this…Sep 3, 2020Sep 3, 2020