
egre55
@egre55
Followers
4K
Following
5K
Media
45
Statuses
2K
@PwnedLabs Founder | Educator | Cybersecurity
Get started in cyber ➡️
Joined May 2016
Cloud security folks!. If you're studying for an AWS, Microsoft or Google cloud security certification, did you know that @PwnedLabs has 30 FREE hands-on cloud security labs to supplement your learning?. That's over 40 hours real-world scenarios for red and blue - for free. Many
2
126
460
RT @vxunderground: Ohhhh, sneaky masquerading trick found in the wild and noted by @JAMESWT_WT. The Threat Actor replaces / with "ん", a Jap….
0
254
0
RT @IAMERICAbooted: 6 places I check when I'm reviewing a company's external footprint and tech stack to get a basic understanding of the a….
0
42
0
RT @IAMERICAbooted: FYI: You can use Purview Content Search to search mailboxes across your org and see what's in the junk folders. You ca….
0
6
0
RT @_dirkjan: It's been almost a year since my last blog. So, here is a new one: Extending AD CS attack surface to the cloud with Intune….
dirkjanm.io
Active Directory Certificate Services (AD CS) attack surface is pretty well explored in Active Directory itself, with *checks notes* already 16 “ESC” attacks being publicly described. Hybrid certif...
0
195
0
RT @binaryz0ne: I’ve officially stepped away from my position at Champlain College & am now looking for new opportunities, in industry or a….
0
12
0
RT @_sigil: My RSAC virtual session is up! Catch "Persisting Unseen: Attacker Methods of Infesting Entra ID" here: .
kknowl.es
I recently presented “Persisting Unseen: Attacker Methods of Infesting Entra ID” at RSAC’s virtual Cloud Security seminar. This session introduced some methods attackers may use now or in the near...
0
5
0
RT @Hac10101: Automated Cloud Misconfiguration Testing — a tool to find misconfigs in GCP. Supports IAM, Cloud Run, App Engine, GCS, Compu….
github.com
Automated Cloud Misconfiguration Testing. Contribute to pwnedlabs/automated-cloud-misconfiguration-testing development by creating an account on GitHub.
0
9
0
RT @_sigil: 🕵️♀️ I'll be presenting "I SPy: Rethinking Entra ID research for new paths to Global Admin” at fwd:cloudsec June 30-July 1, al….
youtube.com
fwd:cloudsec is a non-profit, conference on cloud security. At this conference you can expect discussions about all the major cloud platforms, both attack and defense research, limitations of...
0
19
0
RT @Frichette_n: This is huge! AWS now requires specific claims in IAM role trust policies using OIDC for new/updated roles. This effective….
0
11
0
RT @brutecat: Leaking the phone number of any Google user.
brutecat.com
From rate limits to no limits: How IPv6's massive address space and a crafty botguard bypass left every Google user's phone number vulnerable
0
170
0
RT @xbz0n: From no creds to Enterprise Admin: my new post shows how AD misconfigs can be chained for total domain control. No exploits need….
xbz0n.sh
Active Directory remains the backbone of most corporate network environments. Despite being a mature technology with decades of security research behind it, ...
0
21
0
RT @infosec_au: IP whitelisting is fundamentally broken. At @assetnote, we've successfully bypassed network controls by routing traffic thr….
github.com
Abuse trust-boundaries to bypass firewalls and network controls - assetnote/newtowner
0
240
0
RT @Frichette_n: Interesting research from @permisosecurity on abusing differences in size limits and white space manipulation to hide IAM….
permiso.io
Permiso uncovered a subtle yet critical logging evasion vulnerability within AWS environments - mainly the differing size limitations of individual AWS CloudTrail logs versus the actual content being...
0
12
0
RT @AustinLarsen_: New Google Threat Intelligence Group (GTIG) research by @dub5p: PRC-nexus 🇨🇳 #APT41 is leveraging innovative tactics, in….
0
34
0
RT @vxunderground: Hahahahhahahaha . Unironically a good idea. It's so unbelievably stupid and it works. Depending on explorer layout, the….
0
209
0
RT @snovvcrash: Why're we still doing the Impacket thing when @skelsec's stuff is so sick?. (just kidding ofc, Impa….
0
59
0