Dissecting Headless — Hack The Box (HTB) Write-UpLately I’ve been playing with hackthebox. I miss doing this stuff, it reminds me of way back in uni running through the tutorials in The…May 20May 20
Great article Asma.One way to achieve this - the most performant team I was in (in industry) rebooted with a 1-day session setting their WoW, including…Nov 29, 20231Nov 29, 20231
Cloud Security Case Study: Analysis and Learnings from CommuteAir’s Leak of the No-Fly ListIn January 2023, maia arson crimew stumbled across a public Jenkins server using default login creds, storing static AWS Access Keys giving…Feb 16, 2023Feb 16, 2023
FLUX LINKAGE PLATES FOR TRIUMPH 675Cut from 4.0–4.5mm thick 5083-H321 alloy plate by abrasive water jet (Google for your area)Oct 1, 2021Oct 1, 2021
An Introduction to TerragruntLevel 200 technical writeup; moderate knowledge of Terraform is expectedSep 29, 2021Sep 29, 2021
Securely and Easily Transmitting Secrets over an Insecure Medium with PGPUse Case: You need to send or receive a secret (password, ssh key) via emailDec 1, 20201Dec 1, 20201
Australian Government Proposal to Take Responsibility for Cybersecurity Incidents affecting…Today I came across the following article in ITNewsNov 18, 2020Nov 18, 2020
flAWS2.cloud — A Deeper Dive into AWS Cloud SecurityI recently completed the original flaws.cloud, and found it enjoyable and rewarding. If you develop with AWS I highly recommend it. As a…Jun 30, 2020Jun 30, 2020