Bonjour fellow offsec bugs. I have a super special h@shtalk for you today.

I know it’s been a while, but I’m starting a journey that I have a feeling is going to be super important for me and I’d like to have it documented.

Today I pwned my first challenge…

Defend The Web is a website for solving Capture The Flag challenges. It provides a variety of challenges with different difficulty levels and covers several domains.

Intro 3

The problem: A blank password prompt given.

The solution: Opened inspect element and looked through the java script code. …

If you’re looking for someone to help you with auditing and compliance of your AWS resources, someone to help you record configurations and changes over time, someone to let you know every time a resource is non-complaint with your security rules, you would think you need several different people for…

Starting with some basics let’s elaborate what URL actually stands for and how can one become an expert in reading URLs so you are always educated about what you’re clicking.

What is a URL?

URL stands for Uniform Resource Locator. A URL is nothing more than the address of a given unique resource on…

A Photo by Stephen Phillips

Being ‘busy’ has recently become a new trend, and while there is absolutely nothing wrong with being busy, being productive is still number one on all the lists that hard working people have. And while being productive does mean working hard, it also means working smart.

If you are someone…

Tianyi Ma Photograph

The AWS Command Line Interface is an open source tool that enables you to interact with AWS Services using commands in your command-line shell.

The AWS CLI provides direct access to the public APIs of AWS Services. …

The usage of stress tools is part of the Vulnerability Analysis in the process of Ethical Hacking​ . …

Splunk is a software mainly used for searching, monitoring, and examining machine-generated Big Data through a web-style interface. It performs capturing, indexing, and correlating the real-time data in a searchable container from which it can produce graphs, reports, alerts, dashboards, and visualizations.

One of the most important concept in Splunk…

Email Header Analysis might be a very important segment of a forensic investigation and although now there are a lot of tools online that can do this for you, it is a skill to be able to read and understand the email header yourself.

For starters, let’s define some basic…

AWS Security tools are divided into 6 crucial components that form the pyramid of AWS Security. Those are:

1. Identity and Access Management
2. Detective Controls
3. Infrastructure Protection
4. Data Protection
5. Incident Response
6. DDoS Mitigation

Identity and Access Management

The tools used for Identity and Access Management in AWS are:



soc analyst serving tech bites as articles.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store