
SANS Holiday Hack Challenge 2024: Snow-mageddon
The SANS Holiday Hack Challenge offers FREE, high-quality, and super fun hands-on cybersecurity challenges designed for all skill levels. Play to learn or practice your skills and stand a chance to win exciting prizes for the top entries.
AWS Trail Recon analyzes permissions of a leaked AWS key by using CloudTrail:LookUpEvents, with tools available in Python and Bash versions, and improvements such as better output formats and low-profile arguments planned.
https://github.com/pr0teus/aws-trail-recon
GitHub - Pr0teus/aws-trail-recon: AWS Trail Recon is an idea that came up during gohacking's offensive AWS security training. The idea is to use cloudtrail:lookupevents to analyze what permissions the user of the leaked key has
AWS Trail Recon is an idea that came up during gohacking's offensive AWS security training. The idea is to use cloudtrail:lookupevents to analyze what permissions the user of the leaked key has...
GitHubVulnerabilities with Linux character devices, particularly with the systemd-run and pkexec commands, showing how low-privileged users can exploit pseudo-terminal (pty) allocations to interact with high-privileged processes and suggests using chown to restrict access as a mitigation.
https://insinuator.net/2024/05/linux-character-devices-exploring-systemd-run-and-pkexec/Linux Character Devices: Exploring systemd-run and pkexec
In this blog post, we quickly look into issues involving character devices. As is typical for Linux, everything is a file, so character devices are referenced as files, such as pseudo terminals (pts) under /dev/pts/. man pty briefly introduces the topic. Essentially, it is used to connect a program, such as a terminal emulator, to a shell. In the end, a pty can read and write like a regular fi ...
Insinuator.netMeta is injecting LLMs that are posing to be humans right inside group messages. Virtual interactions will become common. The value of IRL gatherings is going to the moon.🌖📈 (church, conferences, book clubs, sports, gyms, etc)
Hey! The other day I gave my good friend HackerFantastic call. We chatted a bit about his family and he also dropped a sweet war story. You should give it a listen!
https://open.spotify.com/episode/455NdJ6TVa8c8xBnxGlS8N
PS don't forget my daughter & I created a fun challenge where you can win a laptop. -> https://haq.news/2024/04/12/
#infosec #cybersecurity
https://twitter.com/hackerfantastic
https://hacker.house/

2024-04-18 : Dial-Up : Matthew Hickey
Listen to this episode from HAQ.NEWS on Spotify. Hey! The other day I gave my good friend HackerFantastic call. We chatted a bit about his family and he also dropped a sweet war story. You should give it a listen! https://twitter.com/hackerfantastic https://hacker.house/ ps don't forget my daughter & I created a fun challenge where you can win a laptop. details -> https://haq.news/2024/04/12/
SpotifyYesterday at #HackSpackeCon, my daughter and I released the #cybersecurity challenge we spent 4 months building. You should play and try to take home the laptop.
https://haq.news/2024/04/12/

Laptop Giveaway - There Can Be Only One
Laptop Giveaway - There Can Be Only One

A cybersecurity researcher shares techniques for crafting XSS payloads through JavaScript event …
A cybersecurity researcher shares techniques for crafting XSS payloads through JavaScript event …

In this recent rundown CloudGrappler, a tool for finding threat data in cloud AWS/Azure, and GMER, …
In this recent rundown CloudGrappler, a tool for finding threat data in cloud AWS/Azure, and GMER, …