PinnedSecurity reference architecture for a serverless applicationA walkthrough of security controls in a serverless architecture via a demo applicationMay 11, 2022May 11, 2022
PinnedEmbedding Security into SDLC using Reference Architectures for developersEmbedding security in SDLCMar 26, 20211Mar 26, 20211
SSRF attack on AWS: Replaying Capital One hack for stealing EC2 metadataThis is a technical demo for performing a SSRF attack on your test AWS account in order to remotely retrieve the metadata stored on EC2Aug 17, 2019Aug 17, 2019
Introduction to Hashing and how to retrieve Windows 10 password hashesIn the security world, you might have heard of the exploit used by hackers to reveal passwords from their hashed counterparts. We call…Jul 3, 20194Jul 3, 20194
AWS-Azure-GCP Services comparison (2019)Hello multi-clouders! I recently started working on a Microsoft Azure engagement and wanted to get a quick introduction to Azure service…May 16, 20191May 16, 20191
Cloud Migration Strategy — Networking (Part 1)Cloud migration can be a nerve-wreaking experience for organizations looking to move their on-premise resources to the Cloud. In this…Jan 14, 2019Jan 14, 2019
Building Serverless Websites in AWSResearching on RESTful APIs, I found the use case for using AWS services to build fully-serverless websites very useful. These can help…Jan 8, 2019Jan 8, 2019