This post will describe the process to setup an AWS EC2 webdav instance with valid Let's Encrypt certificates. This could be used in attacks where the adversary controls the UNC path and wants an alternative encrypted webdav solution.…
This post provides a resolution to an issue preventing Microsoft Powershell Core from installing on Kali Rolling.…
This post provides various tactics for hunting Microsoft Azure credentials within a DevOps environment. Topics include environment variables, PowerShell AzureRM and the Secret Manager utility.…
This post reveals how an attacker can leverage a developer's workstation to compromise their AWS credentials and gain access to an ec2 instance.…
The first of two AWS credential posts, we discuss how to find and use AWS credentials during post-exploitation.…