DevOoops: Client Provisioning (Kickstart Files)
Notes from the 2015 Devoops talk. Posting it so i can remove it from the slide deck but still refer to it. Also relevant from a common problems with devops theme.Kickstart Files3 ways to set root...
View ArticleDevOoops: Client Provisioning (Vagrant)
Notes from the 2015 Devoops TalkVagrant used to ship with a default keypair and was difficult to rotate.**fixed with new versions of Vagrant. Finding hosts using the default key still pretty likely.Did...
View ArticleDevOoops: In-Memory Databases (Redis) Part 2
Doing part 2 first as the altcoin mining stuff is interesting with the mongoDB/elasticsearch ransomware stuff currently going on.A redis developer dropped an interesting piece of info...
View ArticleKano review
Below is a quick review of the Kano computer.WTF is it?The kano computer is a raspberry pi based computer that is meant for kids to put together and build themselves. Looks a bit like this:propaganda...
View ArticleInsomniaHack Trip Report
Insomni'Hack Info:https://insomnihack.ch/Favorite talksBridging the gap between ICS(IoT?) and corporate IT securityStefan LüdersI really enjoyed this talk hearing how an organization defends in a BYOD...
View ArticleRaspbian/Kano OS in QEMU
Quick notesI wanted to be able to boot the Kano OS in a virtual machine so i could play hack minecraft with the kids and play along with the Kano OS desktop/games. I was trying to avoid plugging a...
View ArticleDevOoops: Hadoop
What is Hadoop?"The Apache Hadoop software library is a framework that allows for the distributed processing of large data sets across clusters of computers using simple programming models. It is...
View ArticleMentoring: On meeting your **Heroes**
Mentoring: On meeting your **Heroes**I put heroes in asterisks because none of us have paparazzi following us around. I regularly use Val Smith's quote about even the most popular infosec person is...
View ArticleNTP/SNMP amplification attacks
I needed to verify a SNMP and NTP amplification vulnerability was actually working. Metasploit has a few scanners for ntp vulns in the auxiliary/scanner/ntp/ntp_* and it will report hosts as being...
View ArticleVulnerability Disclosure, Free Bug Reports & Being a Greedy Bastard
Backstory:Most of my life I've been frustrated/intrigued that my Dad was constantly upset that he would "do the right thing" by people and in return people wouldn't show him gratitude... up to straight...
View ArticleFollow up to the vuln disclosure post
Summary of responses from this post: http://carnal0wnage.attackresearch.com/2017/06/vulnerability-disclosure-free-bug.htmlI wanted to document/summarize some of the responses I received and some of the...
View ArticleMentoring: On Blogging
Received the question about blogging. More specifically:How and WhyHow to benefit from bloggingHow to be consistent with postingIn my mind, the key to success and blogging is to be totally selfish in...
View ArticleBooks I'd give to my 30yr old self
A good friend/co-worker recently turned 30. In preparation for his birthday party I gave some thought to my 30th birthday and the things I now know or have an idea about and what I wish I had known at...
View ArticleDark Side Ops I & 2 Review
Dark Side Ops I https://silentbreaksecurity.com/training/dark-side-ops/https://www.blackhat.com/us-17/training/dark-side-ops-custom-penetration-testing.html A really good overview of the class is here...
View ArticleAWS EC2 instance userData
In the effort to get me blogging again I'll be doing a few short posts to get the juices flowing (hopefully).Today I learned about the userData instance attribute for AWS...
View ArticleI found a GCP service account token...now what?
Google Cloud Platform (GCP) is rapidly growing in popularity and i haven't seen too many posts on f**king it up so I'm going to do at least one :-)Google has several ways to do authentication but most...
View ArticleKubernetes: kube-hunter.py etcd
I mentioned in the master post one a few auditing tools that exist. Kube-Hunter is one that is pretty ok. You can use this to quickly scan for multiple kubernetes issues.Example run:$...
View ArticleKubernetes: open etcd
Quick post on Kubernetes and open etcd (port 2379)"etcd is a distributed key-value store. In fact, etcd is the primary datastore of Kubernetes; storing and replicating all Kubernetes cluster state. As...
View ArticleKubernetes: cAdvisor
"cAdvisor (Container Advisor) provides container users an understanding of the resource usage and performance characteristics of their running containers. It is a running daemon that collects,...
View Article