In the old days, physical press kits were paper-based and mailed old skool. Today, music artists can use digital media for promotion. This is known as an electronic press kit, or EPK. What is an EPK? An Electronic Press Kit is a digital resume for all audiences that is the promotional materials, giving everyone an Read More …
Quick Note :: Attribute Based Access
We then end up with two main classifications of access control: Role-Based Access Control (RBAC). Define the role for the access to data, eg Policy = Subject (AND/OR) Role –> Permissions. Attribute-Based Access Control (ABCL). Define attributes eg Policy = User (role, nationality) AND/OR Resource (department, owner) AND/OR Action AND/OR Context (time, IP, location) -> Read More …
NOTES :: Retrieval Augmented Generation (RAG)
A solution model pattern in how to leverage large language models. Systems that use LLM but on their own content. Start Large language models can be inconsistent. Sometimes they nail the answer to questions, other times they regurgitate random facts from their training data. If they occasionally sound like they have no idea what they’re Read More …
Backyard Chicken Jukebox – Day 139 – Burning Down the Chicken
https://youtu.be/aOVFo_PUvTk The 2 brown chickens have started laying eggs, and we have been enjoying them very much. So far between the 2 chickens, we get 10 eggs a week. The 3 baby chicks seemed to have stalled in their growth a bit, and are getting bullied by Dua Lipa often. Taylor Chick sometimes comes to Read More …
Hacker Video – Fyodor – Nmap: Scanning The Internet – Defcon 16
Oldie but one of my favorites The Nmap Security Scanner was built to efficiently scan large networks, but Nmap’s author Fyodor took this to a new level by scanning millions of Internet hosts as part of the Worldscan project. He presents the most interesting findings and empirical statistics from these scans, along with practical advice Read More …
Movie Review – The Painter
In one of my favorite scenes of ridiculousness. Let’s Escalate the scene by having a bunch of people. Act like they’re typing stuff into a computer. While the woman screams things into a walkies talkie. Add another point in the end, The agent whose switch sides and becomes the good guy Get shot in the Read More …
Backyard Chicken Jukebox – Day 133 – The Chicken from Ipanema
https://youtu.be/Xke2vX-6tnI The 2 brown chickens have started laying eggs, and we have been enjoying them very much. So far between the 2 chickens, we get 10 eggs a week. The 3 baby chicks seemed to have stalled in their growth a bit, and are getting bullied by Dua Lipa often. Taylor Chick sometimes comes to Read More …
Some fun AWS reads
Bucket Monopoly: Breaching AWS Accounts Through Shadow Resources https://www.aquasec.com/blog/bucket-monopoly-breaching-aws-accounts-through-shadow-resources/ Capturing Exposed AWS Keys During Dynamic Web Application Tests https://www.praetorian.com/blog/capturing-exposed-aws-keys-during-dynamic-web-application-tests/ AWS Network Firewall egress filtering can be easily bypassed https://canglad.com/blog/2023/aws-network-firewall-egress-filtering-can-be-easily-bypassed/
Hacker Video – SIEGECAST: Kerberoasting & Attacks 101
Want to understand how Kerberos works? Would you like to understand modern Kerberos attacks? Tim Medin walks you through how to attack Kerberos with ticket attacks and Kerberoasting. He covers the basics of Kerberos authentication and then shows you how the trust model can be exploited for persistence, pivoting, and privilege escalation. At the conclusion, Read More …
Low Literacy Rates in the USA
a.k.a. Idiocracy is coming This bit of blog snark is from this post : 54% of American Adults Read Below 6th Grade-Levels. Medium is going to make you sign up for at least a free account in order for you to read the whole article. Yeah! /snark I have no idea why the Marxist was Read More …