Cloud Sleuthing: Decoding AWS Infrastructure
Cloud Sleuthing: Decoding AWS Infrastructure OVERVIEW AWS a.k.a Amazon Web Services is one of the oldest and most widely used cloud service […]
Investigating Power cat Reverse Shell Activity
Investigating Powercat Reverse Shell Activity OVERVIEW The primary objective of adversaries or attackers is to maintain persistence within the targeted infrastructure. To […]
The Fine Line: Walking the Nmap Tightrope as a Purple Teamer
The Fine Line: Walking the Nmap Tightrope as a Purple Teamer INTRODUCTION Nmap a.k.a Network mapper is one of the prominent tools […]
Powercat : Setting Up Reverse Shells For Internal Assessments
Powercat : Setting Up Reverse Shells for Internal Assessments Moving laterally across devices to penetrate deeper into the network subsumes part of […]
Fortifying Cloud Vaults: A Guide to Securing Cloud Storage – Part3
Fortifying Cloud Vaults: A Guide to Securing Cloud Storage – Part3 As we continue our journey through the realm of cloud storage […]
Strategies to Defend Against IAM targeted Attacks
Strategies to Defend Against IAM targeted Attacks OVERVIEW AWS Identity and Access Management (IAM) serves as both a user management system and […]
Fortifying Cloud Vaults: A Guide to Securing Cloud Storage – Part 2
Fortifying Cloud Vaults: A Guide to Securing Cloud Storage – Part 2 As we proceed with our exploration of cloud storage services, […]
Diving into the World of Adversary Simulation with CRTA
Diving into the World of Adversary Simulation with Certified Red Team Analyst The Red Team Analyst [CRTA] course is designed to train […]
Proactive approach for Securing S3 Buckets
Proactive approach for Securing S3 Buckets OVERVIEW Among all AWS services, S3 is the most targeted by attacks due to its availability […]
Fortifying Cloud Vaults: A Guide to Securing Cloud Storage – Part1
Fortifying Cloud Vaults: A Guide to Securing Cloud Storage – Part1 In today’s digital age, organisations and individuals increasingly rely on cloud […]
Investigating Domain Fronting-Based Attacks and Cutting-Edge Detection Strategies
Investigating Domain Fronting-Based Attacks and Cutting-Edge Detection Strategies In-recent trends adversaries are increasingly targeting on-premise/cloud infrastructure, including critical servers and systems within […]
Unmasking the XZ Utils Vulnerability : CVE-2024-3094
Unmasking the XZ Utils Vulnerability :CVE-2024-3094 Evolution of Supply Chain Attack In recent trends, exploiting the supply chain has developed tremendously, as […]