Airman

934 posts

Airman

Airman

@airman604

Been doing #InfoSec for ages...

Katılım Aralık 2011
446 Takip Edilen342 Takipçiler
Airman
Airman@airman604·
@LiveOverflow @0daySecured Portswigger has a lab on this #bypassing-samesite-lax-restrictions-with-newly-issued-cookies" target="_blank" rel="nofollow noopener">portswigger.net/web-security/c…
English
0
0
0
105
Airman
Airman@airman604·
@kmcquade3 Bitwarden you can host yourself, if that’s your jam.
English
0
0
1
0
Airman
Airman@airman604·
@kmcquade3 Had good experience with 1Password and Bitwarden.
English
1
0
1
0
Kinnaird McQuade 💻☁️💥
What do you use for your password manager? If you have tried alternatives, why do you like your current one better than others?
English
11
0
6
0
Airman
Airman@airman604·
Extremely important #AppSec topic for tech companies and dev teams that is not talked about much. How to focus on the right things to fix and not drown in busywork that doesn't affect the security bottom line? Curious to hear how others approach this. linkedin.com/posts/danloren…
English
0
0
0
0
Airman
Airman@airman604·
@kelseyhightower +1, and kubectl also supports both - “apply” vs “run”
English
0
0
2
0
Airman
Airman@airman604·
@OWASP_Ottawa Thanks for hosting me and for all the great questions!
English
0
0
0
0
Marco Lancini
Marco Lancini@lancinimarco·
🔖 Terraform as part of the software supply chain Post examining the supply chain aspects of Terraform, starting with a closer look at malicious Terraform modules and providers and how you can better secure them. about.gitlab.com/blog/2022/06/0…
English
1
3
8
0
Airman
Airman@airman604·
@OWASP_Ottawa Join to watch as I stumble through the demo ;)
English
1
0
0
0
Nick Frichette
Nick Frichette@Frichette_n·
To my knowledge, the three ways to do this would be via either local-exec, creating your own module, or via external providers.
English
2
0
0
0
Airman
Airman@airman604·
@InsanityBit This tweet is so important to understand for everyone involved in #AppSec and/or blue team.
English
0
0
0
0
Colin O'Brien
Colin O'Brien@InsanityBit·
wtf do you do here? Like, you can keep getting back onto the box, but there's no straightforward way to actually communicate out. You can attempt privescs, but you have no idea why things fail since you have no logs.
English
1
0
4
0
Colin O'Brien
Colin O'Brien@InsanityBit·
Attackers - you have a supply chain "rce" into a project. The svc deploys with no external internet access, runs in a docker container, can only communicate to a few internal services, and all comms are mTLS. The instance is rotated daily. You can exploit reliably, repeatedly.
English
1
2
6
0