Jaime Polop

36 posts

Jaime Polop

Jaime Polop

@PolopJaime

Katılım Haziran 2023
14 Takip Edilen23 Takipçiler
Jaime Polop retweetledi
HackTricks
HackTricks@hacktricks_live·
🚨 CI/CD can become your attack surface. Wiz found an unanchored regex in AWS CodeBuild webhook filters that let attackers bypass PR trust checks and run code in privileged builds. One small CI misconfig → supply-chain compromise.
English
1
2
1
529
Jaime Polop retweetledi
Pablo Picurelli Ortiz
Pablo Picurelli Ortiz@superpegaso2703·
¡Ya se publicó la agenda RootedCON2026! Mi charla es el 7 de marzo, que ganas de que llegue el tremendo momento. #RootedCON #RootedCON2026
Pablo Picurelli Ortiz tweet media
Español
1
1
4
289
Jaime Polop retweetledi
HackTricks
HackTricks@hacktricks_live·
🛢️ Azure Cosmos DB is often seen as a secure, managed database, but misconfigured permissions can turn it into a privilege-escalation goldmine. Over-privileged identities may grant roles, extract account keys, or even abuse firewall rules to bypass network restrictions.
English
1
2
5
454
Jaime Polop retweetledi
HackTricks
HackTricks@hacktricks_live·
🌍 Expanded Language Support now available! All our course videos now include multilingual subtitles (ES, IT, PT, FR, DE, JP, CN, KR, GR, HI, PL) to support our students all over the world. If another language would help your learning, let us know! training.hacktricks.xyz
English
0
1
4
653
Jaime Polop retweetledi
HackTricks
HackTricks@hacktricks_live·
Presenting Blue-CloudPEASS - available in HackTricks Tools! Now you can easily assess the IAM configuration of AWS, GCP and Azure from your browser using the Blue-CloudPEASS tool directly from tools.hacktricks.wiki #hacktricks #tools #iam #cloud
English
0
2
6
429
Jaime Polop retweetledi
HackTricks
HackTricks@hacktricks_live·
🔓 AWS Lambda AWS Lambda lets you run code without managing servers, but misconfigurations can expose serious security risks and hidden attack paths. Lambda can be abused to run unauthorized code, expose secrets via environment variables, and move laterally across AWS services.
English
1
1
1
720
Jaime Polop retweetledi
HackTricks
HackTricks@hacktricks_live·
Hidden risks in Azure App Services Azure App Services expose management and publishing interfaces that can grant deep access. With the right permissions or attackers could retrieve credentials enable SSH. Review roles, rotate profiles, and disable unused FTP/SCM.
English
1
2
3
513
Jaime Polop retweetledi
HackTricks
HackTricks@hacktricks_live·
Practice in our hands-on labs and learn more about these concepts with AWS Training Red Team Expert Certification - ARTE. Enroll now at training.hacktricks.xyz/courses/arte
English
0
1
1
471
Jaime Polop retweetledi
HackTricks
HackTricks@hacktricks_live·
ECR: what’s inside Docker images AWS ECR images can hide code, configs,even secrets & API keys. Pulling them may expose data. Scan images for vulns & secrets, enforce least privilege, and don't bake long-lived creds. Learn more at cloud.hacktricks.wiki/en/pentesting-…
English
1
1
3
598
Jaime Polop retweetledi
HackTricks
HackTricks@hacktricks_live·
GCP Workflows — what your orchestrations might reveal Over-priv or plaintext creds can leak secrets, hit other APIs, and enable lateral movement. Treat workflows as sensitive code: least privilege, no creds in params, use Secret Manager, watch audit logs & restrict deploy/modify.
English
1
1
1
547
Jaime Polop retweetledi
HackTricks
HackTricks@hacktricks_live·
ECR: what’s inside Docker images AWS ECR images can hide code, configs, even secrets & API keys. Pulling them may expose data. Scan images for vulns & secrets, enforce least privilege, and don't bake long-lived creds. Learn more at cloud.hacktricks.wiki/en/pentesting-…
English
0
1
1
510
Jaime Polop retweetledi
HackTricks
HackTricks@hacktricks_live·
🔐 Just dropped: New AWS Upskill Challenge on @JustHackingHQ Learn AWS Security & the Shared Responsibility Model in a quick, hands-on, totally FREE challenge. ✔️ Key concepts ✔️ Practical steps ✔️ Fast quiz 👉 Join now: justhacking.com/uc/uc-aws-secu…
English
0
7
23
1.9K
Jaime Polop retweetledi
/RootedCON
/RootedCON@rootedcon·
☁️ Cloud Pentesting (AWS, GCP, Azure) ☁️ Tres días, tres nubes, un objetivo: dominar la seguridad en entornos cloud. Carlos Polop (@hacktricks_live), Jaime Polop (@PolopJaime) e Ignacio Domínguez te enseñarán a atacar y defender los tres gigantes: AWS, GCP & Azure. 📅 ¿Cuándo? 3, 4 y 5 de marzo ⏰ Horario: 09:00h - 20:00h 📍 ¿Dónde? Eurostarts i-Hotel Lo que aprenderás: 🔹 Día 1: AWS – Fundamentos, pentesting White Box & Black Box. 🔹 Día 2: GCP – Servicios clave, explotación y ataque Red Team. 🔹 Día 3: Azure – Enumeración, explotación y persistencia. 🔹 CTFs para poner a prueba lo aprendido en entornos ficticios. 🔹 Estrategias para seguir aprendiendo y perfeccionando tus habilidades. Tanto si estás empezando en seguridad cloud como si quieres llevar tu pentesting a otro nivel, este Bootcamp te dará herramientas reales para atacar y defender entornos cloud. 🔗 ¡Inscríbete ahora en nuestra página web! cfp.rootedcon.com 🚀 #rooted #rootedcon2025 #ciberseguridad #hacking #congreso #hacker
Español
0
5
11
2.9K