Backyard Chicken Jukebox – Day 139 – Burning Down the Chicken

https://youtu.be/aOVFo_PUvTk The 2 brown chickens have started laying eggs, and we have been enjoying them very much. So far between the 2 chickens, we get 10 eggs a week. The 3 baby chicks seemed to have stalled in their growth a bit, and are getting bullied by Dua Lipa often. Taylor Chick sometimes comes to Read More …

Hacker Video – Fyodor – Nmap: Scanning The Internet – Defcon 16

Oldie but one of my favorites The Nmap Security Scanner was built to efficiently scan large networks, but Nmap’s author Fyodor took this to a new level by scanning millions of Internet hosts as part of the World scan project. He presents the most interesting findings and empirical statistics from these scans, along with practical Read More …

Backyard Chicken Jukebox – Day 133 – The Chicken from Ipanema

https://youtu.be/Xke2vX-6tnI The 2 brown chickens have started laying eggs, and we have been enjoying them very much. So far between the 2 chickens, we get 10 eggs a week. The 3 baby chicks seemed to have stalled in their growth a bit, and are getting bullied by Dua Lipa often. Taylor Chick sometimes comes to Read More …

Some fun AWS reads

Bucket Monopoly: Breaching AWS Accounts Through Shadow Resources https://www.aquasec.com/blog/bucket-monopoly-breaching-aws-accounts-through-shadow-resources/ Capturing Exposed AWS Keys During Dynamic Web Application Tests https://www.praetorian.com/blog/capturing-exposed-aws-keys-during-dynamic-web-application-tests/ AWS Network Firewall egress filtering can be easily bypassed https://canglad.com/blog/2023/aws-network-firewall-egress-filtering-can-be-easily-bypassed/

Hacker Video – SIEGECAST: Kerberoasting & Attacks 101

Want to understand how Kerberos works? Would you like to understand modern Kerberos attacks? Tim Media walks you through how to attack Kerberos with ticket attacks and Kerberoasting. He covers the basics of Kerberos authentication and then shows you how the trust model can be exploited for persistence, pivoting, and privilege escalation. At the conclusion, Read More …

NOTES :: Purdue Model

The Purdue Model The Purdue model is generally accepted as the standard for building an industrial control system (ICS) network architecture in a way that supports OT security, separating the layers of the network to maintain a hierarchical flow of data between them, and as such, reflects the baseline architecture requirements for many industrial control Read More …