PinnedSecurity reference architecture for a serverless applicationA walkthrough of security controls in a serverless architecture via a demo applicationMay 11, 2022May 11, 2022
PinnedEmbedding Security into SDLC using Reference Architectures for developersEmbedding security in SDLCMar 26, 2021A response icon1Mar 26, 2021A response icon1
SSRF attack on AWS: Replaying Capital One hack for stealing EC2 metadataThis is a technical demo for performing a SSRF attack on your test AWS account in order to remotely retrieve the metadata stored on EC2Aug 17, 2019Aug 17, 2019
Introduction to Hashing and how to retrieve Windows 10 password hashesIn the security world, you might have heard of the exploit used by hackers to reveal passwords from their hashed counterparts. We call…Jul 3, 2019A response icon4Jul 3, 2019A response icon4
AWS-Azure-GCP Services comparison (2019)Hello multi-clouders! I recently started working on a Microsoft Azure engagement and wanted to get a quick introduction to Azure service…May 16, 2019A response icon1May 16, 2019A response icon1
Cloud Migration Strategy — Networking (Part 1)Cloud migration can be a nerve-wreaking experience for organizations looking to move their on-premise resources to the Cloud. In this…Jan 14, 2019Jan 14, 2019
Building Serverless Websites in AWSResearching on RESTful APIs, I found the use case for using AWS services to build fully-serverless websites very useful. These can help…Jan 8, 2019Jan 8, 2019