Tim :fairydust:

Internal Pentester for IoT

Moved from twitter.com/t3gsec

Tim :fairydust:t3csec@chaos.social
2023-01-07

I really like the way to report it via GitHub actions:

"This tool runs periodically via Github Actions and sca ns new releases from PyPi, HexPM and RubyGems for AWS keys.[...]
Because these keys are committed to a public Github repository, Github’s Secret Scanning service kicks in and notifies AWS that the keys are leaked.
This causes AWS to open a support ticket with you to notify you of the leak, and apply a quarantine policy on the key[...]"

- tomforb.es/i-scanned-every-pac

#aws #infosec #pypi

Tim :fairydust: boosted:
2022-12-21

RT @DigitalHubMs
Investment alert: Cantaloupe und Predli investieren 650.000 Euro in @datacake. Das Unternehmen aus Münster positioniert sich als “multi-purpose no-code #IoT platform”. twitter.com/DStartups/status/1

Tim :fairydust: boosted:
2022-12-18

I've read many requests to add Mastodon links to GitHub profiles for verification and discovery purposes.

My team is working on allowing you to add a number of social profile links, but given upcoming holiday vacations, it won't ship until the new year. We don't want to rush something out at the potential cost of disrupting what is generally a quiet time for our engineers.

Ordinarily, I wouldn't talk about in progress work on social media, but y'all seem like you can keep a secret.

Tim :fairydust: boosted:
2022-12-16

Great post by @sethsec on cloud pentesting. This was 100% my experience coming from a traditional pentest background. sethsec.blogspot.com/2022/12/c

Tim :fairydust: boosted:
Christophe :purple_potion:christophetd@infosec.exchange
2022-12-15

📢​ 🎄​ 📅​ Advent of cloud security 2022

Every day between December 1st and December 24th, I will post an interesting fact about cloud security!

Follow #AdventOfCloudSecurity or the associated RSS feed

⬇️

Tim :fairydust: boosted:
2022-11-28
Tim :fairydust: boosted:
2022-11-24

Quick blog post from the Datadog Security Labs team: using our open source tool guarddog, we found an interesting backdoored python package. @christophetd and our staff researcher, Vlad, investigated and reported it. We LOVE using guarddog! securitylabs.datadoghq.com/art

Tim :fairydust: boosted:
2022-11-22

With all the training managers get on how to coach an underperforming employee, it's arguably *more* important to recognize and reward employees hitting major developmental milestones or going above and beyond.

If you're a manager, get creative (and sync with their recognition preferences). A true leader knows when and how to bend the rules - if they worked overtime to get something done, give them a free day or two off. Go out of *your* way to help them with a passion project or problem that's been annoying them. Recognize them in a team meeting. Send *your* boss an FYI email about the good work they did. And obviously, fight on their behalf during merit increases.

Tim :fairydust: boosted:
2022-11-21

#introduction Hello friends, I’m Josh Kamdjou

I’m a red teamer turned defender working on a new open approach to email security at @sublime

I got into #infosec when I was an early teen. My high school (Wootton — where my Marylanders at?) was ahead of its time. We got trained up on Cisco routers, networking, and crimping RJ45s. I started playing around with *nix distros on my own time, and one thing led to another and I started popping VMs in my home lab network and dropping sub7.

This eventually led to my discovery of @metasploit. I started popping things left and right, dropping keyloggers, and taking remote screenshots. I couldn’t get enough of it. It’s an understatement to say that if it weren’t for legends like @mubix, @hdm, @carnal0wnage, @egypt and the tools and content they put out there for the community, I probably wouldn’t be where I am today. I’ll forever be grateful, and it’ll take me a lifetime to pay it forward.

I decided to take up Computer Science at the University of Maryland (#terps) and joined UMD’s Cybersecurity Club circa 2010. We did CCDC (I remember going up against @mubix at the time 🙂), won MDC3, and a group of us were asked to pen-test UMD’s network. I popped a Department through phishing (naturally) and exfil’d the crown jewels. I think my favorite part was control over the stadium’s big screen. RIP #MS08067

After college, I started full-time doing offensive cyber related things in and around the DoD until 2019. There are not enough words to describe how formative, impactful, and meaningful these years were for me — working alongside our nation’s most talented, driven, and mission-oriented humans to make the world a safer place.

I continued to do offensive work in the private industry to stay current, and wrote up one of those engagements back in early 2019 on the techniques used to gain access via #phishing: blog.sublimesecurity.com/red-t

I started working on @sublime as a side project, nights and weekends, to see if I could build a tool that would stop me as an attacker. Over a year later, the product was inserting warning banners into email clients with digestible information so that users could make more informed decisions when viewing a suspicious message. It was working: click rates were way down and I had early happy customers. I was lucky enough to meet @ianthiel, who joined me on the journey as my co-founder, and we continued to build the product and team out together.

We built and released emailrep.io, a free email reputation API, and I gave a talk on it at Shmoocon back in 2020: Voight-Kampff for Email Addresses: Quantifying Email Address Reputation to Identify Spear-Phishing and Fraud

Talk: youtube.com/watch?v=awVEYrbvYm
Slides: slideshare.net/JoshuaKamdjou/v

We pivoted Sublime in 2021 after realizing that we, like every other email security product, had become the bottleneck for innovation. When red teamers or attackers came up with a way to slip through, defenders couldn’t close that gap themselves even if they wanted to — they had to wait days, sometimes months, for their vendor to close the gap. Rumor has it some are still waiting to this day.

Defenders had tools to close attack surface, collaborate, and hunt in nearly every aspect of security: YARA for binaries, Snort for IDS, Sigma+EQL for logs, but nothing for email.

So that’s what we built. Sublime is free to use via Docker/CF, has an email provider agnostic DSL that lets you collaborate with the community, build custom detection rules, hunt, etc. The team is now 12 strong, and we’ve been quietly refining the product in private beta over the past year with a group of incredible design partners. Stay tuned, because we have some exciting news to share with the world in 2023.

In my free time, I love weight lifting, spending time with family, and venturing out into nature and disconnecting. I recently hiked the Tour du Mont Blanc and witnessed the most beautiful sight I’ve ever seen camped out at the top of the mountains. Growing up, Martial Arts and soccer were a big part of my life. I’m a 3rd dan in Taekwondo, spent some time training and competing in Seoul, and played soccer competitively until college. I haven’t done either in years, but would love to get back into it at some point.

This is probably the most I’ve ever shared about my life online, feels like I should have stopped awhile ago. But here we are. HMU if you ever wanna nerd out about email security, offensive cyber, martial arts, or literally anything else really. Happy to be here with ya’ll.

I’ll leave you with a quote from someone that was close to me that’s guided so much of my life: “Do what you will, make the world a better place.”

Tim :fairydust: boosted:
Very Hairy Jerryjerry@infosec.exchange
2022-11-21

I just ordered Alice and Bob, which will be the test hosts. Once built, they will become alice.infosec.exchange and bob.infosec.exchange, and will only federate with each other for the purposes of security testing a similar instance configuration to that use by infosec.exchange.

Tim :fairydust: boosted:
Joanie ✔️😉Joanie@mastodon.art
2022-11-20
Tim :fairydust: boosted:
2022-11-19

If you seek (inspiration for) some security awareness (quiz) questions at work or for your friends have a look at this resource. Feel free to use it!

johnopdenakker.com/security-aw

#infosec

Tim :fairydust: boosted:
Security Onion 🧅​securityonion@infosec.exchange
2022-11-19

Looking for a fun #Infosec #CyberSecurity project for the weekend? 😀​

Want to practice your #ThreatHunting 🔍​ and #IncidentResponse skills?

Install #SecurityOnion 🧅​ in a VM:
docs.securityonion.net/en/2.3/

Then follow along with our recent quick #malware analysis blog posts:
blog.securityonion.net/search/

Tim :fairydust: boosted:
Alan :loading:Alan@infosec.exchange
2022-11-13

#Cybersecurity Hiring Manager Handbook by Kip Boyle, Marc Menninger, and other contributors.

Covers the foundations of team building, preparing to hire, selecting the right candidate, retaining team members, and how to handle leavers.

cybersecurity-hiring-manager-h

#SecurityManagerThings

Tim :fairydust: boosted:
2022-11-06

As security researchers, we don’t often publicly talk about failed research projects (for obvious reasons). While it may be a bit embarrassing to not succeed at your goals, there are still lessons learned from the project, and knowledge that may help the next researcher tackle their own endeavors. In this thread, I’d like to detail some research I’ve been doing on-and-off on identifying advanced AWS honeytokens. 🧵 #AWSSecurityResearch #SecurityResearch

Tim :fairydust: boosted:

I keep seeing people say Mastodon is nothing like Twitter. And they’re right.

Mastodon is an echo of the old internet, it’s decentralised, chaotic. What you get depends on your sysadmin. You can’t search, everything has to be shared to you by a human. Networks split apart and rejoin. What you see is your unique connection to it.

Is this good? Maybe. But for me that’s the internet I grew up with. No algorithms, no targeted adverts, just human interaction, and it was glorious.

Tim :fairydust: boosted:
KitaHackathon - KitagipfelKitahackathon@bildung.social
2022-11-06

Hallo liebes #Fediverse, wir sind gerade von #Twitter hier rüber gerutscht. Wir mischen ein bisschen die frühkindliche Bildung auf und stehen für den ersten bundesweiten digitalen KitaHackathon. Crazy! :-) Aktuell planen wir alles für 2023. Wer Lust hat uns zu unterstützen und sich vor allem mit Social Media auskennt: schreibt uns gerne an (team(at)kitahackathon.de) oder hier. Hello World! #NeuHier #tröt

Tim :fairydust: boosted:
Andrew Coutscouts
2022-11-06

: We have an opportunity to define better ethics around how we treat non-public figures on Mastodon. Some Qs to get the convo going (non-journos, please weigh in too!):

• How do we responsibly boost, quote, link to, and otherwise cite public posts by non-public figures?

• Does the decentralized nature of Mastodon change the nature of how we treat what is shared here vs centralized, corporate platforms?

• How do we responsibly judge who has power and who doesn’t on Mastodon?

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst