
Low Orbit Security
@LowOrbitSec
Followers
383
Following
34
Media
33
Statuses
79
Tailored Security Solutions from @grahamhelton3
Virginia
Joined February 2023
Happy new year! Gubble is out now!. Gubble is a tool that queries the Workspace API to analyze Group permissions to identify potential security risks, allowing both offensive and defensive teams to programmatically identify risky permissions. PoCs: 🧵.
github.com
gubble is a tool designed to audit Google Workspace group settings. It analyzes settings such as who can join, view membership, post messages, view conversations, and more to help identify potentia...
2
12
49
RT @GrahamHelton3: Golden Ticket Attack In Kubernetes? 🤔. A new post exploitation & persistence tool for Kubernetes just came out called Ku….
0
91
0
The openssl binary is present in many containers images such as:.- go.- haproxy.- kong.- nginx.- php.- rabbitmq.etc. Combined with a simple shell script, we can use openssl to scan for hosts using this crazy oneliner you can find at this github gist: .
gist.github.com
GitHub Gist: instantly share code, notes, and snippets.
0
1
3
RT @GrahamHelton3: 🚨 Reminder! I'll be opening at the @RedTeamVillage_ conference tomorrow (February 8th) at 10AM EST with ~2 hours of li….
0
1
0
6. If you want to read more about what happened after the attack, you can read the full report here. A turf war for control over the Kubernetes cluster ensued with multiple threat actors fighting for control of the cluster. It's a fun read!.
crowdstrike.com
The Dero cryptojacking operation locates Kubernetes clusters with anonymous access enabled on a Kubernetes API and listens on non-standard ports accessible from the internet.
0
0
2
If you enjoy these weekly posts, consider subscribing so you get the emails straight to your Inbox and don't have to hope you catch them on your timeline. You can do so here:.
loworbitsecurity.com
A shorter post this week for reasons that will become obvious in the near future. Show Not Tell Lately, I've been putting a lot of thought into offensive security. There are so many useful areas of...
0
0
3
Offensive security shouldn't really exist. However, it does (and is impactful) because company's are run by humans who unknowingly operate under the "Show Not Tell" mentality. You can read more of my thoughts on this topic here:.
loworbitsecurity.com
A shorter post this week for reasons that will become obvious in the near future. Show Not Tell Lately, I've been putting a lot of thought into offensive security. There are so many useful areas of...
1
2
15
Very interesting data from @wiz_io , excited for the full report. TLDR; Attackers are scanning for exposed Kubernetes clusters and Pods are being deployed in a more secure manner. Of note: 21% of Pods having Critical vulnerabilities is terrifying.
🚨Newly deployed #Kubernetes clusters are under attack within just 18 minutes. Malicious actors waste no time probing for weaknesses in your setup.
0
0
3
RT @RedTeamVillage_: 📢 Save the Date!. RTV Overflow: A full-day virtual event packed with your favorite workshops! 🚀.📅 Date: Feb 8, 2025.⏰….
0
8
0