Blog
-
Tasting the Honey(pot)
Simple Google-dorking will reveal tens of thousands of leaked credentials for multiple services, machine logins, email addresses, social media accounts, software license keys and pretty much anything that can grant identity. Even with Google’s attempts to skip indexing this data and masking sensitive information, there are thousands of pages found across paste sites and forums. This number grows significantly when using non-mainstream search engines. Given that a sizable amount of social media traffic and the overwhelming majority of general internet traffic is generated by bots/botnets that need some sort of identity to operate on these platforms and tend to takeover accounts to continue their campaigns, it is crucial to understand how these automated entities propagate themselves across applications and protocols.
-
Pypher: Exploring Gopherspace through a terminal-UI browser
If you’re nostalgic for simple, non-interactive, text-only sites or value hobbyist content free of downsides of the modern web, you might want to check out the Gopher protocol. Half the fun in engaging with relatively esoteric protocols is writing your own client.
-
GoMerkle: Learning Go by Implementing Merkle-trees
I have programmed in Python for a few years now and since most of my projects are focused on prototyping and tooling, I haven’t really needed to think about runtime performance or memory footprint. Concepts of strict typing and memory allocation and access have started to feel distant. I figured, might as well give Go a shot, since it checks those skill boxes while still being relatively high level and general purpose. As a starter project, I decided to learn Go by implementing my personal favourite data structure and one that some of my prior research work is based on - merkle trees. The source code: {anishsujanani/gomerkle}.
-
Beanstalk-Reporter: Aggregating Information for AWS Resources
I recently wrote a tool that aggregates information for resources linked to AWS Elastic Beanstalk deployments for easier security monitoring and auditing. You may find the source {here}.
-
Auto-deploying a Container Monitoring Platform
I was recently exploring container security monitoring solutions and came across {Falco}: an open-source sys-call based solution. Coupled with an interest in {AWS Cloudformation} templates (infrastructure-as-code), I thought it would be interesting to automate the entire deployment; a one-click solution.
-
OAuth2.0 Auth-Code Flows & RBAC from scratch with NodeJs
The OAuth2.0 framework defines a set of protocols that allow an application to obtain authorization grants for certain resources/actions of a user by delegating authentication and consent to a centralized server.
-
Same-site Cookies and Session Security
The addition of SameSite Cookie Policies to Chrome opens up a discussion on improved browser-based security through its implications on sessions, cross-origin assets, user experience and service development.
-
Infosec For Small And Medium Sized Businesses
Regardless of the size of an organization, a successful security program requires well rounded control implementation across multiple domains and business units. This article aims to provide context on the same.
-
Microcorruption Embedded Write-ups Lv. 1-8
The Microcorruption Embedded CTF platform provides challenges that require you to understand security issues in custom electronic lock firmware, emulated on a
Texas Instruments MSP430
microcontroller. -
Email Security — DKIM, SPF And DMARC
With email being one of the most popular forms of communication across machines, there is an obvious importance in understanding the underlying protocols, pitfalls and security measures. This article documents my understanding of the current best-practice email security frameworks.
-
Understanding And Fixing File Upload Security Issues
File uploads, magic numbers, common PHP programming flaws and code execution.