.                                        +     .             .   . .  .   .  + .  . 
                                  *                           ;                   +                            .              .   .  +  . .  . * .
         .         :                                      - --+- -                      .                               .  .   .    .    . . : . .
   .               !                                          !                                                       .     .     . +.    +  .  + 
                   :        .             .                   .                                                         .       .   . .  .        
                   |_                                                                             .                  .    * . . .  .  +   .       
                ,  |  .                                                                            +      .       .   .   .      +   .           .
          --- --+-<+>-+- ---                                    *                        .                          .       . +  .+. .         . :
                `._| ,'                                                             .                            .     . + .  . .     .      .    
                   T                                                                      .        .      .    .     . .   . . .        ! /       
                   |                                                                                        .    . .  +    .  .       - O -       
       *           !                                   .                                          .     .    .  +   . .  *  .       . / |         
                   .                                                +                .          .      . + .  .  .  .. +  .                       
                           *                                                        .    .        .  .  *   .  *  . +..  .            *       .   
Credits: Ojo from asciiart.eu (Slightly modified)

Our garden

Garden article template

Copy and paste this to create a new article.
Created by Brian Mayer
Maturity: seed
Updated 22 Sep 23 05:40 BST

Linux configs for minimalists

Configuration files and decisions for minimalist Linux users.
Created by Brian Mayer
Maturity: seed
Updated 22 Sep 23 05:40 BST

News from the network

The WAF Swiss-Knife

2024-05-19 from pomba.net

This blogpost showcases some not-so-commonly-advertised benefits and features that modern WAFs have, and how they can be used in an average company to gain benefits ranging from technical to political. It also provides some tips and tricks that I would have liked to know a few years ago. This was originally presented as a talk...

Helm Chart Templating Tricks

2024-04-11 from blog.16090000.xyz

Some trick to alleviate the daily Helm burden of managing multiple equal resources in your deployments.

GCP-Pentest-Lab – A reproducible cloud pentesting lab in GCP

2024-04-09 from pomba.net

During the year 2023, I was a Cloud Security lecturer at FIAP. Long story short, It was an amazing experience. However, when we got to the more “red-team” parts of the course, I had trouble finding educational resources. I wanted a pentesting lab that would allow my students to exploit real-world misconfigurations, without the usual...

GCP – Extract all granted IAM permissions for all users

2023-10-13 from pomba.net

Introduction The following bash script is pretty simple. It generates a CSV that lists, for each user, all the roles given to them and in which resources. It’s great for doing IAM reviews. Note: if, for example, a user has access to a project, this scripts only lists the role granted at the project level....

Configs Vulneráveis Comuns em Stacks Google (GCP + Workspace)

2022-11-20 from pomba.net

Essa talk foi apresentada na B-Sides SP 2022, que ocorreu no dia 20/11/2022. Todo o conteúdo está disponível aqui: https://github.com/maximus-hackers/gcpBsides2022 Link direto do Docs: https://docs.google.com/presentation/d/164wBOdmQYWr2nFVR251XoFVY_GuUO7hJuIPdGRZY6FM/edit?usp=sharing Views: 234

Splunk – How to deal with delayed events in Alerts

2022-09-23 from pomba.net

If you’re using Splunk for Alerting, there is a problem that can occur where an event: Is generated before a scheduled search is executed But is only received after the search is done This will mean that: The scheduled search that should inspect the time-frame where the event was generated will not find the event,...

GCP – SSH into VMs without Public IP’s via IAP Tunneling (A better tutorial)

2022-09-15 from pomba.net

Table of Contents Activating IAP with OSLogin (best option) Activating IAP for Project Owners Activating IAP for Admins Activating IAP without OSLogin Introduction IAP Tunneling is extremely useful for acessing resources that don’t have public IPs.In fact, it’s much safer and easier than assigning public IPs and configuring Firewall rules, or setting up VPNs inside...

GCP – SSH into VMs as Service Account when OSLogin is enabled

2022-05-03 from pomba.net

OSLogin requires every SSH key to be tied to a user. For normal / human users the process is straight-forward and there is a lot of documentation about it. For Service Accounts, things get a little weirder… This tutorial will show you how to create an SSH key that is tied to a Service Accout...