Offensive WMI - The Basics (Part 1)

Offensive WMI - The Basics (Part 1)
This blog post is the first of a many part series on WMI and is intended for fairly new audiences. A basic understanding of Powershell will definitely help the reader while going through the blog, however, it is not a requirement. That’s it, let us jump into the real stuff. Introduction # Why WMI? # WMI is a set of specifications from Microsoft that was designed for fast and efficient administration when it comes to Windows systems.
Continue reading →

Pwning a Backend with a Backdoor

Pwning a Backend with a Backdoor
Development is a important task. But mindful secure development is much more important. In this quick blog post, I detail an unusual way in which I was able to escalate access to several production instances behind a properly secured network. How it started. # It all started with me casually checking some traffic data for a tool I authored on GitHub. GitHub allows you to view a few stats for the past 14 days, viz.
Continue reading →

Utilizing CI/CDs to the Fullest for Fun and Profit

Utilizing CI/CDs to the Fullest for Fun and Profit
Hey folks, We all have heard of CI/CDs right? I was exploring GitHub Actions and what I found was the fact that it was an extremely underrated resource which is not quite widely used for general purposes by people. In this blog post, I aim to detail how people can really benefit from CI/CDs with GitHub Actions in focus, and how one can fully exploit the resource to get the most out of it.
Continue reading →

Fingerprinting WAF Rules with Timing Based Side Channel Attacks

Fingerprinting WAF Rules with Timing Based Side Channel Attacks
Hi folks, Today in this post I am going to be detailing about my recent experiments with web application firewalls (WAFs) focusing on a specific type of side channel attacks, namely, timing. In my opinion, this field hasn’t been studied actively and the results can be more lethal than you’re expecting. This post is already long, so lets get started rightaway. :) Side Channel Attacks? # Wikipedia defines side-channel attacks as:
Continue reading →