08 Mar Populating Azure environment with test data I was trying to get access to the Microsoft Developer Program simply because they allow you to load in a 08 Mar 2025 3 min read
03 Nov Cloud security - Got Milk? IAM enumeration and S3 compromise (__) (oo) /------\/ "Moo-ving to S3!" / | || * /\---/\ ~~ ~~ References: The IAM policies and commands used in this scenario were based 03 Nov 2024 5 min read
02 Sep Malware analysis - .NET - Backdoor GlobalProtect application Sample * Name: Setup.exe * SHA256: e3880c7db78e09748fe9caf02f330b1c61cd3aaaa31ffe93fb5ba1fb1035f761 References * Trend Micro: https://www.trendmicro.com/en_us/research/24/h/threat-actors-target-middle-east-using-fake-tool.html 02 Sep 2024 7 min read
27 Aug Cryptography in malware - RSA/DiffieHellman/ECC Objectives * Provide an overview of fundamental RSA/DiffieHellman/ECC concepts in an easy to digest format. * Provide a reference for 27 Aug 2024
26 Aug Cryptography in malware - Salsa/ChaCha fundamentals - Cheatsheet Objectives * Provide an overview of fundamental Salsa/ChaCha concepts in an easy to digest format. * Provide a reference for later 26 Aug 2024
24 Aug Cryptography in malware - AES fundamentals - Cheatsheet Objectives * Provide an overview of fundamental AES concepts in an easy to digest format. * Provide a reference for later review 24 Aug 2024
24 Aug Cryptography in malware - Fundamental concepts - Cheatsheet Objectives: * Provide an overview of fundamental cryptography concepts in an easy to digest format. * Provide a reference for later review 24 Aug 2024