PinnedPublished inInfoSec Write-upsEnumeration and lateral movement in GCP environmentsThis write up is about a pentest we did in which we managed to compromise a hybrid GCP hosted infrastructure using native GCP tools for…Jun 1, 2022159Jun 1, 2022159
Published inInfoSec Write-upsArchitecture of a ransomware (2/2)In part 1(https://securityshenaningans.medium.com/architecture-of-a-ransomware-1-2-1b9fee757fcb) we explained key concepts necessary to…Nov 26, 202093Nov 26, 202093
Published inInfoSec Write-upsArchitecture of a ransomware (1/2)Last couple of months we’ve seen a rise in ransomware related incidents, mostly due to the increase of remote work COVID-19. Nevertheless…Nov 24, 20201011Nov 24, 20201011
Published inInfoSec Write-upsRecipe for a successful phishing campaign (part 2/2)Recap: In part 1 we saw general considerations you should keep in mind in order to start setting up your infrastructure…Oct 15, 202065Oct 15, 202065
Published inInfoSec Write-upsRecipe for a successful phishing campaign (part 1/2)IntroductionOct 13, 2020197Oct 13, 2020197
Published inInfoSec Write-upsExploiting AWS IAM permissions for total cloud compromise: a real world example (part 2/2)IntroductionOct 1, 202046Oct 1, 202046
Published inInfoSec Write-upsExploiting fine-grained AWS IAM permissions for total cloud compromise: a real world example (part…IntroductionSep 29, 2020171Sep 29, 2020171
Published inInfoSec Write-upsAWS IAM explained for Red and Blue teamsIntroductionSep 24, 2020631Sep 24, 2020631
Published inInfoSec Write-upsCombining Hadoop and MCollective for total network compromiseThis is the story of how only two insecure configurations allowed us to take down an entire cloud hosted company. It was a gray box…Sep 22, 2020148Sep 22, 2020148
Published inInfoSec Write-upsHow a badly configured DB allowed us to own an entire cloud of over 25K hosts (part 2/2)On part 1 we briefly explained how we got administrator privileges to almost all BMC devices hosting a native Openstack cloud. In this…Sep 3, 202072Sep 3, 202072
Published inInfoSec Write-upsHow a badly configured DB allowed us to own an entire cloud of over 25K hosts (part 1/2)IntroductionSep 1, 2020Sep 1, 2020
Published inInfoSec Write-upsBuilding a SIEM: combining ELK, Wazuh HIDS and Elastalert for optimal performanceWhen putting together a SIEM, one of the first things that you need to decide on is the distributed architecture you’re going to choose…Aug 25, 20205Aug 25, 20205
Published inInfoSec Write-upsWhy you should always scan UDP (part 2/2)We finished part 1 having gained unprivileged access to a host in a new network. Afterwards, we wanted to gain privileges to continue…Aug 20, 20201Aug 20, 20201
Published inInfoSec Write-upsWhy you should always scan UDP ports (part 1/2)IntroductIn this story we’ll see how we exploited snmp vulnerabilities, bypassed firewall rules and AppArmor to compromise the network.Aug 18, 20201Aug 18, 20201
Published inInfoSec Write-upsChaining multiple vulnerabilities to exfiltrate over 250GB of PIAThis is a write-up of an internal pentest we did a couple of years ago, that involved several small vulnerabilities but allowed us to…Aug 10, 2020Aug 10, 2020
Published inInfoSec Write-upsBuilding a SIEM: centralized logging of all Linux commands with ELK + auditdRecently, working with the SOC department, we had to enable command logging for more than 10k instances. We also needed to implement a way…Aug 6, 20201Aug 6, 20201
Published inInfoSec Write-upsThe danger of world writable NFS sharesDisclaimer: to prevent information leaks for this company, most of the evidence/screenshots here were recreated from the real ones as…Aug 4, 2020Aug 4, 2020