A quick tip on my experiments around Powershell Core in Mac / Linux
I am specifically messing around with the Azure AD + Microsoft teams functionality.
Now a days we are living in difficult times (covid19 and all) and one way to maintain some sanity is to involve ourselves in some shape or form of learning. In that spirit i am today opening the github repo of my HTML5 course from private to public and making all those resources that i gathered public for everyone to access.
This course was created back in 2015 when html5 was just in its infancy contains some basic attack and defense tips. I hope it can be of good use to people.
Feel free to suggest changes, submit pull requests with updated content and improvements.
URL for the repository is here : https://github.com/anantshri/html5_attack_and_secure
Another good run at BlackHat came to an end. I always wanted to write about what goes behind the scenes. This year I was leading the AIH 4-day edition and then was supposed to do a talk on DevSecOps: What why and how. most of it is outlined https://www.notsosecure.com/hackersummercamp-2019/ however I wanted to focus on behind the scene.
I always thought about writing this one behind the scene post but never had a more adventurous trip so hence writing this down this time around.
Recently i was asked to help someone run vagrant ansible combination on windows. Its a fun experiment coz ansible never claimed to support windows as control device and the solution [partial at this point] is a series of workaround and gotcha’s that i have listed so far.
I want to make sure i don’t lose this experiment hence documenting it out in a quick blog post
Chris gates at Carnal0wnage wrote a thought provoking article today and raised couple of questions. This topic is something i definitely have been thinking for past couple of years. Here are my thoughts outlined with respect to various questions asked.
Before i answer these let this be very clear, the answers are my own and are not associated with any of my work or company i work for. The below answers are my own and are subjected to change if adequate reasons provided refer disclaimer here. Also the answers are from a point of view of someone who is a pentester, does public disclosures or bug hunting for opensource, did a stint in bug bounty also but i have had very little experience on the other side of bug bounty table i.e. receiving bugs found in my own applications or websites.