gafnit

26 posts

gafnit

gafnit

@gafnitav

เข้าร่วม Kasım 2019
60 กำลังติดตาม1.3K ผู้ติดตาม
Marco Lancini
Marco Lancini@lancinimarco·
Who are some fresh voices in Cloud Security that I should definitely follow? I'm getting a bit bored of seeing the same set of people all the time 😅
English
17
7
56
19.8K
gafnit รีทวีตแล้ว
BlueHat IL
BlueHat IL@BlueHatIL·
It's on! BlueHat IL Nights is returning on June 22nd. Join us for the ultimate security bash with renowned Microsoft researcher Ned Moran, as he unveils the untold secrets of Iranian cyber operators like never before. Register now! microsoftrnd.co.il/bluehatil/Blue…
BlueHat IL tweet media
English
2
10
30
9.3K
gafnit รีทวีตแล้ว
Shir
Shir@shirtamari·
Continuing the #BingBang thread, many have asked how we found the vulnerable Bing Trivia endpoint. Let me share our unique Azure Active Directory cloud reconnaissance technique to find misconfigured authentication prompts🧵
Shir tweet media
English
15
151
570
110.2K
gafnit รีทวีตแล้ว
Luke Tucker
Luke Tucker@luketucker·
Every once in a while a resource comes along that just oozes value. This is one of those resources by my pal Jonathan Rau. It’s a gargantuan 110 pages chocked full with code goodies and guidance. Check it out and put it into practice!
English
0
2
2
1.1K
Luke Tucker
Luke Tucker@luketucker·
Cloud Security Researchers are such a rare talent. Learn about my amazing colleague Dana Tsymberg and what a day in her life at Lightspin looks like. Way more than just vuln hunting, Dana, @gafnitav and team do such great research for the benefit of all those in the cloud.
English
1
0
11
1.3K
gafnit
gafnit@gafnitav·
An amazing find by @Frichette_n that shows again the power of undocumented API. Many cloud security solutions including GuardDuty itself rely on the expected coverage of CloudTrail events to identify malicious activity.
Nick Frichette@Frichette_n

New cloud security research! We found a method to bypass CloudTrail logging for specific IAM actions via an undocumented API service! Attackers could perform some reconnaissance activities while being undetected. securitylabs.datadoghq.com/articles/iamad…

English
0
2
9
1.4K
Daniel Grzelak
Daniel Grzelak@dagrz·
If you are into aws security @gafnitav is a must follow — doing some of the best research I’ve seen.
English
2
1
23
0
gafnit
gafnit@gafnitav·
@feralninja1 That's a good question. Usually that happens when some functionality was supported in the past, they decided to remove it, but forgot to remove the hardcoded trusted domain from the JavaScript.
English
1
0
0
0
feralninja
feralninja@feralninja1·
@gafnitav Why do you think that cloudshell-df.azurewebsites.net was not already registered when they hardcoded it in the code to be trusted? A possible mistake from a developer perhaps? Or am I misunderstanding? I mean, that's a pretty big ooops obviously. :)
English
1
0
0
0
gafnit รีทวีตแล้ว
Scott Piper
Scott Piper@0xdabbad00·
The proactive community engagement by @notdurson of AWS security is a huge asset to the trust us cloudsec folks have in AWS. Thank you.
English
3
12
108
0
gafnit
gafnit@gafnitav·
@christophetd Neither. If the signed token already includes the cluster id you cannot use it for other clusters. The idea was to show how in crafted token the validation can be bypassed.
English
0
0
0
0
Christophe Tafani-Dereeper
Christophe Tafani-Dereeper@christophetd·
@gafnitav The impact of (2) is unclear to me. Assuming I have a valid token for a cluster in a specific AWS account, can I (a) use that to authenticate to another cluster in the same account? (b) another cluster in a different account?
English
1
0
0
0
gafnit
gafnit@gafnitav·
@luketucker Lucky working with you as well :) thanks for sharing!
English
0
0
2
0
Luke Tucker
Luke Tucker@luketucker·
Kubernetes security is notoriously complex and the number of talented security researchers in this space is limited. @gafnitav is an amazingly talented hacker that I'm lucky to work with at Lightspin. Check out her latest find in the full technical writeup.
English
1
1
8
0
gafnit
gafnit@gafnitav·
@_fel1x @0xdabbad00 Thank you for writing such detailed post on the HashiCorp Vault vuln. It was very helpful.
English
0
0
0
0
Scott Piper
Scott Piper@0xdabbad00·
Interesting to see this still had another issue after @_fel1x had found one issue in the same code: bugs.chromium.org/p/project-zero… which was a derivative of his finding in Hashicorp Vault googleprojectzero.blogspot.com/2020/10/ and a second look had happened at this code github.com/kubernetes-sig…
gafnit@gafnitav

Exploiting AWS IAM Authenticator by crafting malicious signed STS GetCallerIdentity request. 👉CVE-2022-2385 blog.lightspin.io/exploiting-eks…

English
2
8
24
0
gafnit
gafnit@gafnitav·
Recent vulnerabilities in Kubernetes NGINX Ingress Controller with details of CVE-2021-25745, CVE-2021-25748. Inspired by Mitch Hulscher CVE-2021-25742. blog.lightspin.io/kubernetes-ngi…
English
0
4
7
0