
Never let your Kube(let) down
Never let your Kube(let) down OVERVIEW Kubernetes a.k.a K8s is one of the most widely used container orchestration platforms. At its core, […]

Server less Siege: Defend, Detect, Defeat
Server less Siege: Defend, Detect, Defeat Serverless computing creates new security challenges while revolutionizing cloud applications. Through practical examples, defenses, and real-world […]

Securing Cross-Account Access in AWS Organizations: Monitoring and Governance
Securing Cross-Account Access in AWS Organizations: Monitoring and Governance With the growth of organisations, managing multiple AWS accounts becomes crucial for simplifying […]

Breaking Free: Docker, Development, and Breakout
Breaking Free: Docker, Development, and Breakout OVERVIEW Containers have been used for more than two decades now with Docker being one of […]

Enumerating AWS IAM Identity Center
Enumerating AWS IAM Identity Center Identity Center AWS IAM Identity Center (formerly known as AWS Single Sign-On) is a cloud service that […]

Cloud Sleuthing: Decoding AWS Infrastructure
Cloud Sleuthing: Decoding AWS Infrastructure OVERVIEW AWS a.k.a Amazon Web Services is one of the oldest and most widely used cloud service […]

Investigating Power cat Reverse Shell Activity
Investigating Powercat Reverse Shell Activity OVERVIEW The primary objective of adversaries or attackers is to maintain persistence within the targeted infrastructure. To […]

The Fine Line: Walking the Nmap Tightrope as a Purple Teamer
The Fine Line: Walking the Nmap Tightrope as a Purple Teamer INTRODUCTION Nmap a.k.a Network mapper is one of the prominent tools […]

Powercat : Setting Up Reverse Shells For Internal Assessments
Powercat : Setting Up Reverse Shells for Internal Assessments Moving laterally across devices to penetrate deeper into the network subsumes part of […]

Fortifying Cloud Vaults: A Guide to Securing Cloud Storage – Part3
Fortifying Cloud Vaults: A Guide to Securing Cloud Storage – Part3 As we continue our journey through the realm of cloud storage […]

Strategies to Defend Against IAM targeted Attacks
Strategies to Defend Against IAM targeted Attacks OVERVIEW AWS Identity and Access Management (IAM) serves as both a user management system and […]

Fortifying Cloud Vaults: A Guide to Securing Cloud Storage – Part 2
Fortifying Cloud Vaults: A Guide to Securing Cloud Storage – Part 2 As we proceed with our exploration of cloud storage services, […]