Code Monkey home page Code Monkey logo

hackingthe.cloud's People

Contributors

aidansteele avatar amkuipers avatar andreacavagna01 avatar andrei8055 avatar benbridts avatar bleemb avatar christophetd avatar costasko avatar delenamalan avatar frichetten avatar gabe-sky avatar gonda-praetorian avatar houey avatar m4wk avatar massyn avatar michael-kirchner-at avatar michaeltwofish avatar mosesrenegade avatar peevees avatar pranavpudasaini avatar ramimac avatar righteousgambit avatar roisec avatar scumdestroy avatar skullduggeryism avatar techbrunch avatar tragulum avatar wdahlenburg avatar webbinroot avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

hackingthe.cloud's Issues

Add nsec2023 AWS CTF

From a cursory glance this CTF looks like it would be an excellent candidate for an article on Hacking the Cloud. My intention is to write a walk through explaining how to setup the CTF and how to complete it. Along the way we will highlight techniques covered by articles on HTC.

[Bug] SneakyEndpoints: STS not working

I got a report that SneakyEndpoints is only working with S3 at the moment. Need to spin it up and test a bit. This may also be a good time to add some additional details to the HtC article.

I'm assuming a default changed in Terraform causing it to no longer work.

Fix Descriptions of Articles

A few articles appear to exist without a period at the end of their descriptions. Not sure if this has an effect on SEO but might as well go in and fix.

IAM Credentials Stored on EC2 Disk

It has been going around the cloudsec community for a while that newer versions of SSM will store IAM credentials on disk. I'm not sure if this would warrant an entire article on it (I'm leaning against that), but it may be worthwhile to add a note to existing articles mentioning this.

Hacking GCP - Resources

I'm currently looking for resources on GCP and I'm gonna list them here to be potentially added to Hacking The Cloud:

Check if GuardDuty Alerts on Stolen Lambda Credentials

I'm about 99.9% sure that there is no GuardDuty detection for this (all the existing ones are about EC2), but the question was asked and I wasn't 100% sure. Check if this is the case and update the page with a note. It would be good info to provide.

S3 Ransomware Article

It's a bit of a stretch, but need to review this article to see if anything can be included in Hacking the Cloud.

BHIS Getting Started in Pentesting The Cloud Azure

Include Author's Name/Profile in Pages They Contribute To

Recently there was some confusion on who to credit for writing a particular page. While there is an author tag on each page, that information is not currently displayed in HTC. It would be optimal if there was some way to show an author or contributors section so folks can know who wrote something. This may also incentivize people to contribute as they now have their name on something (Which is totally okay and encouraged!).

In looking into this a bit more with Material for MKDocs, this is something that is being added to the Insiders build (or at least, is on the roadmap). Additionally, Martin Donath showed this on his Twitter page.

Once this feature is available, we will adopt this on Hacking the Cloud.

Fix Odd CNAME Bug

This issue is just to remind me of a bug. If you'd like to contribute, please checkout the contributing guide .

There is a strange behavior where every time there is a deploy, the custom domain in the repo settings reverts to null. This, obviously, breaks the site for as long as that custom domain is not changed. While I could go in an manually apply it every time, that is tedious to say the least.

Use new `whoami` API command

It looks like in the time since May AWS has added SNS publish to the list of data events you can log to CloudTrail (most recent). Not a huge deal, just need to choose a new API call that doesn't log and add that to the post.

AWS Consoler

First of all, I really like the documentation :)

Thanks to you I discovered (or rediscovered I'm not sure) the tool AWS Consoler.

I think the requirements to use the tool should be added, if I understood correctly they are either:

  • being able to call sts:GetFederationToken
  • or sts:AssumeRole with a known role

SCARLETEEL Round 2

There is some legitimately interesting tradecraft in the second SCARLETEEL blog post. I'm sure at least something could be added to Hacking the Cloud from it.

Implement Plagiarism Policy

  • Create a policy for plagiarism
    • Policy for rejecting it
    • Information for an author to request content be removed

Terraform ANSI Escape

I really liked the ANSI escape technique described here This would be something of value to include in the Terraform section.

Docker Build for mkdocs fails

Hi,
sorry, I would not call myself a developer so hopefully this is not something totally silly and a 'user fault' by me.

I cloned the repo locally on my ubuntu machine and ran docker build -t mkdocs-material . however it fails with:

f860f95a24e2: Pull complete 

a1dee26347e0: Pull complete 

Digest: sha256:7346fbc9c31ac7af1c577db0f2301ba25d24ff076a15a4e049f1b8c29840b746

Status: Downloaded newer image for squidfunk/mkdocs-material:latest
 ---> 566a49fd70f9

Step 2/3 : RUN pip install mkdocs-awesome-pages-plugin
 ---> Running in 2cb15d5aa13f

WARNING: Retrying (Retry(total=4, connect=None, read=None, redirect=None, status=None)) after connection broken by 'NewConnectionError('<pip._vendor.urllib3.connection.HTTPSConnection object at 0x7f886fa9bd90>: Failed to establish a new connection: [Errno -3] Try again')': /simple/mkdocs-awesome-pages-plugin/

etc.
The command '/bin/sh -c pip install mkdocs-awesome-pages-plugin' returned a non-zero code: 1

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.