Blog
In praise of LAPS
When performing internal tests on a company's network, one of the top priorities is compromising Windows workstations and servers. This is made much easier when local administrator accounts have the...
Three Most Common Security Mistakes Seen During AWS Application Assessments
Security is often a big concern when it comes to cloud computing. According to the Cloud Security Alliance (CSA), traditional security issues under the responsibility of cloud service providers...
Security Assessment Color Palette
There are many different types of security assessment methodologies identified by cute color associations. Here are simple descriptions of the most popular to help you choose which approach is right...
Unintentionally exposing your organization to MFA bypasses on Azure Active Directory
Some organizations may believe that they are enforcing a second authorization factor when using Microsoft Single-Sign On on Azure Active Directory, but their configuration might have an easy way to...
Secrets in Broad Daylight, or How $500,000/Year Software Can Help Hackers Compromise Your Network
You might have taken all the right steps to secure a corporate Windows workstation: your users are not running as local admins, endpoint protection is in place, service ACLs and file permissions are...
Decrypt TLS traffic with mitmproxy & Wireshark
You can view decrypted TLS connections in Wireshark by creating a key log file using mitmproxy: Set an environment variable to point to the desired location to record the TLS encryption keys: export...
Backend DDoS protection
Is your website hosted behind a CDN? Could an attacker brute force or guess your website's origin URL? Are your origin servers hardened against DDoS threats? A common website...
Universal Principle of Smoothness
This post is fundamentally about humans and how they achieve goals. It is about defeating our tendencies when solving hard problems and pushing the boundaries of our performance. I call it the...
An Easy Cybersecurity Model for Busy Execs
Do you know what your organization's attack surface is? Attack surface is everything that a bad person (aka “attacker”) can interact with or touch. Your organization’s attack surface consists of PIA:...
Cybersecurity Threat Modeling for Business Leaders
As a business leader, you are likely familiar with SWOT analysis. SWOT is a strategic planning exercise to help identify a business’s Strengths, Weaknesses, and Opportunities, as well as Threats...