PinnedAnunay BhattSecurity reference architecture for a serverless applicationA walkthrough of security controls in a serverless architecture via a demo application11 min read·May 11, 2022----
PinnedAnunay BhattEmbedding Security into SDLC using Reference Architectures for developersEmbedding security in SDLC8 min read·Mar 26, 2021--1--1
Anunay BhattSSRF attack on AWS: Replaying Capital One hack for stealing EC2 metadataThis is a technical demo for performing a SSRF attack on your test AWS account in order to remotely retrieve the metadata stored on EC2·5 min read·Aug 17, 2019----
Anunay BhattIntroduction to Hashing and how to retrieve Windows 10 password hashesIn the security world, you might have heard of the exploit used by hackers to reveal passwords from their hashed counterparts. We call…6 min read·Jul 3, 2019--4--4
Anunay BhattAWS-Azure-GCP Services comparison (2019)Hello multi-clouders! I recently started working on a Microsoft Azure engagement and wanted to get a quick introduction to Azure service…2 min read·May 16, 2019--1--1
Anunay BhattCloud Migration Strategy — Networking (Part 1)Cloud migration can be a nerve-wreaking experience for organizations looking to move their on-premise resources to the Cloud. In this…4 min read·Jan 14, 2019----
Anunay BhattBuilding Serverless Websites in AWSResearching on RESTful APIs, I found the use case for using AWS services to build fully-serverless websites very useful. These can help…4 min read·Jan 8, 2019----