Objective 3 Task Extract information about Azure Functions in the target environment. Use a function key to retrieve Flag 3 from a function. Find Flag 4 by using a logic app parameter. Us...
Objective 2 Use a SAS URL to access a storage account in target Azure environment. Abuse storage account versioning to extract sensitive information. Fuzz a logic app to find parameters for...
Hey there and welcome back to another blog post series. This time, I’m excited to share my experiences delving into cloud security, with a particular focus on Azure Pentesting. On December 5th, 202...
iSleuth - The iOS Odyssey We equip our employees with a phone of their preference. We keep an observant eye on these devices, ensuring there’s no misuse or suspicious behavior. But things went awr...
Hey there and welcome back to another blog post. I will be discussing my challenges for the BSides Nairobi 2023 Cyber Challenge that took place on the 04/11/2023 at USIU. The challenge was tackled ...
We’ve all heard the saying, “looks can be deceiving.” In the world of cybersecurity, this saying rings truer than ever before, especially when we talk about the O.MG Cable. At first glance, it migh...
Welcome back to yet another blog post where I will be tackling a Maldoc kinda challenge from Lets Defend. This is a medium rated challenge prepared by @DXploiter called PDF Analysis. We are told t...
So recently, an Intern at our company asked me several question about Apache web server and SSL certificates. I decided to do a blog post on the same and hopefully you’ll also get to learn a thing ...
Hello and happy new year. Welcome to my first blog in ‘23 where i will be showing you how easy you can self-host your note-taking application at home. I feel like the search for a good notetaking p...