61 Followers
168 Following
34 Posts

Internal Pentester for IoT

Moved from https://twitter.com/t3gsec

Interests#InfoSec #SecOps #DevSecOps #IoT #Pentesting #SecureByDesign
LanguageGerman, English
Pronounshe/him

I really like the way to report it via GitHub actions:

"This tool runs periodically via Github Actions and sca ns new releases from PyPi, HexPM and RubyGems for AWS keys.[...]
Because these keys are committed to a public Github repository, Github’s Secret Scanning service kicks in and notifies AWS that the keys are leaked.
This causes AWS to open a support ticket with you to notify you of the leak, and apply a quarantine policy on the key[...]"

- https://tomforb.es/i-scanned-every-package-on-pypi-and-found-57-live-aws-keys/

#aws #infosec #pypi

I scanned every package on PyPi and found 57 live AWS keys

After inadvertently finding that InfoSys leaked an AWS key on PyPi I wanted to know how many other live AWS keys may be present on Python package index. After scanning every release published to PyPi I found 57 valid access keys from organisations like: Amazon themselves 😅 Intel Stanford, Portland and Louisiana University The Australian Government General Atomics fusion department Terradata Delta Lake And Top Glove, the worlds largest glove manufacturer 🧤 This post outlines the way I scanned PyPi, showcases a project I’ve built that automatically scans all new PyPi releases to notify AWS of potentially leaked keys, presents some analysis of the keys I’ve found and draws a few conclusions at the end.

RT @DigitalHubMs
Investment alert: Cantaloupe und Predli investieren 650.000 Euro in @datacake. Das Unternehmen aus Münster positioniert sich als “multi-purpose no-code #IoT platform”. https://twitter.com/DStartups/status/1604857684406288384
deutsche-startups.de on Twitter

“#DealMonitor - VMRay sammelt 34 Millionen ein – Demecan bekommt 15 Millionen – Blockbrain sammelt 2,5 Millionen ein https://t.co/zFH4eS8ZA9”

Twitter

I've read many requests to add Mastodon links to GitHub profiles for verification and discovery purposes.

My team is working on allowing you to add a number of social profile links, but given upcoming holiday vacations, it won't ship until the new year. We don't want to rush something out at the potential cost of disrupting what is generally a quiet time for our engineers.

Ordinarily, I wouldn't talk about in progress work on social media, but y'all seem like you can keep a secret.

Great post by @sethsec on cloud pentesting. This was 100% my experience coming from a traditional pentest background. https://sethsec.blogspot.com/2022/12/cloud-penetration-testing-not-your.html
Cloud penetration testing: Not your typical internal penetration test

There seems to be a common path for experienced penetration testers who are thrown into the world of cloud penetration testing. I'm talking ...

📢​ 🎄​ 📅​ Advent of cloud security 2022

Every day between December 1st and December 24th, I will post an interesting fact about cloud security!

Follow #AdventOfCloudSecurity or the associated RSS feed

⬇️

If you own an elinksmart product. Consider dropping them! Check if you cross used your password.

The API has some flaws like SQLi, IDOR and other vulnerabilities.

They are not fixed.

(https://nv1t.github.io/blog/the-weired-ble-lock)

The weired BLE-Lock

tl;dr; My knowledge in Bluetooth LE Communication got quite rusty over time and i wanted to refresh it with an easy target the other day. I wanted to open up the lock with a simple bluetooth command but ended up having access to their entire backend database with a lot...

Blog
Quick blog post from the Datadog Security Labs team: using our open source tool guarddog, we found an interesting backdoored python package. @christophetd and our staff researcher, Vlad, investigated and reported it. We LOVE using guarddog! https://securitylabs.datadoghq.com/articles/malicious-pypi-package-fastapi-toolkit/
Investigating a backdoored PyPi package targeting FastAPI applications | Datadog Security Labs

In this post, we analyze a malicious PyPI package attempting to backdoor FastAPI applications.

With all the training managers get on how to coach an underperforming employee, it's arguably *more* important to recognize and reward employees hitting major developmental milestones or going above and beyond.

If you're a manager, get creative (and sync with their recognition preferences). A true leader knows when and how to bend the rules - if they worked overtime to get something done, give them a free day or two off. Go out of *your* way to help them with a passion project or problem that's been annoying them. Recognize them in a team meeting. Send *your* boss an FYI email about the good work they did. And obviously, fight on their behalf during merit increases.

#introduction Hello friends, I’m Josh Kamdjou

I’m a red teamer turned defender working on a new open approach to email security at @sublime

I got into #infosec when I was an early teen. My high school (Wootton — where my Marylanders at?) was ahead of its time. We got trained up on Cisco routers, networking, and crimping RJ45s. I started playing around with *nix distros on my own time, and one thing led to another and I started popping VMs in my home lab network and dropping sub7.

This eventually led to my discovery of @metasploit. I started popping things left and right, dropping keyloggers, and taking remote screenshots. I couldn’t get enough of it. It’s an understatement to say that if it weren’t for legends like @mubix, @hdm, @carnal0wnage, @egypt and the tools and content they put out there for the community, I probably wouldn’t be where I am today. I’ll forever be grateful, and it’ll take me a lifetime to pay it forward.

I decided to take up Computer Science at the University of Maryland (#terps) and joined UMD’s Cybersecurity Club circa 2010. We did CCDC (I remember going up against @mubix at the time 🙂), won MDC3, and a group of us were asked to pen-test UMD’s network. I popped a Department through phishing (naturally) and exfil’d the crown jewels. I think my favorite part was control over the stadium’s big screen. RIP #MS08067

After college, I started full-time doing offensive cyber related things in and around the DoD until 2019. There are not enough words to describe how formative, impactful, and meaningful these years were for me — working alongside our nation’s most talented, driven, and mission-oriented humans to make the world a safer place.

I continued to do offensive work in the private industry to stay current, and wrote up one of those engagements back in early 2019 on the techniques used to gain access via #phishing: https://blog.sublimesecurity.com/red-team-techniques-gaining-access-on-an-external-engagement-through-spear-phishing

I started working on @sublime as a side project, nights and weekends, to see if I could build a tool that would stop me as an attacker. Over a year later, the product was inserting warning banners into email clients with digestible information so that users could make more informed decisions when viewing a suspicious message. It was working: click rates were way down and I had early happy customers. I was lucky enough to meet @ianthiel, who joined me on the journey as my co-founder, and we continued to build the product and team out together.

We built and released emailrep.io, a free email reputation API, and I gave a talk on it at Shmoocon back in 2020: Voight-Kampff for Email Addresses: Quantifying Email Address Reputation to Identify Spear-Phishing and Fraud

Talk: https://www.youtube.com/watch?v=awVEYrbvYmQ&t=3s
Slides: https://www.slideshare.net/JoshuaKamdjou/voightkampff-for-email-addresses-quantifying-email-address-reputation-to-identify-spearphishing-and-fraud-226745475

We pivoted Sublime in 2021 after realizing that we, like every other email security product, had become the bottleneck for innovation. When red teamers or attackers came up with a way to slip through, defenders couldn’t close that gap themselves even if they wanted to — they had to wait days, sometimes months, for their vendor to close the gap. Rumor has it some are still waiting to this day.

Defenders had tools to close attack surface, collaborate, and hunt in nearly every aspect of security: YARA for binaries, Snort for IDS, Sigma+EQL for logs, but nothing for email.

So that’s what we built. Sublime is free to use via Docker/CF, has an email provider agnostic DSL that lets you collaborate with the community, build custom detection rules, hunt, etc. The team is now 12 strong, and we’ve been quietly refining the product in private beta over the past year with a group of incredible design partners. Stay tuned, because we have some exciting news to share with the world in 2023.

In my free time, I love weight lifting, spending time with family, and venturing out into nature and disconnecting. I recently hiked the Tour du Mont Blanc and witnessed the most beautiful sight I’ve ever seen camped out at the top of the mountains. Growing up, Martial Arts and soccer were a big part of my life. I’m a 3rd dan in Taekwondo, spent some time training and competing in Seoul, and played soccer competitively until college. I haven’t done either in years, but would love to get back into it at some point.

This is probably the most I’ve ever shared about my life online, feels like I should have stopped awhile ago. But here we are. HMU if you ever wanna nerd out about email security, offensive cyber, martial arts, or literally anything else really. Happy to be here with ya’ll.

I’ll leave you with a quote from someone that was close to me that’s guided so much of my life: “Do what you will, make the world a better place.”

Red Team Techniques: Gaining access on an external engagement through spear-phishing

There have been a lot of posts about crafting red team phishing campaigns, and most are incomplete. Today, we're going to walk through one of our recent external engagements from start to initial access.

Sublime Thoughts
I just ordered Alice and Bob, which will be the test hosts. Once built, they will become alice.infosec.exchange and bob.infosec.exchange, and will only federate with each other for the purposes of security testing a similar instance configuration to that use by infosec.exchange.