ContentPosts from @shafislam..
Link
@faun shared a link, 2 years, 4 months ago
FAUN.dev()

Hunting for Nginx Alias Traversals in the wild

Nginx, a dominant web server since 2004, is widely used across websites and Docker containers. This article explores Nginx's intricacies, including the location and alias directives, potential vulnerabilities arising from misconfigurations, and real-world case studies showcasing the risk of data exp.. read more  

Hunting for Nginx Alias Traversals in the wild
Link
@faun shared a link, 2 years, 4 months ago
FAUN.dev()

Azure Load Testing: You can run load tests from command-line now

Azure Load Testing is a fully managed load testing service that allows you to easily generate large scale load. It can be used with the Azure CLI command-line interface and offers flexible output options, as well as integration with automation systems like CI/CD workflows... read more  

Azure Load Testing: You can run load tests from command-line now
Link
@faun shared a link, 2 years, 4 months ago
FAUN.dev()

What is Packet Duplication & How to Identify It

Unleash your inner network admin and conquer the mystery of packet duplication in the digital landscape of modern business. Learn how to identify and mitigate packet duplication to maintain data integrity and optimize network performance... read more  

What is Packet Duplication & How to Identify It
Link
@faun shared a link, 2 years, 4 months ago
FAUN.dev()

Use Confidential Virtual Machines and Enclaves to improve your cluster security

Confidential computing, using hardware-enforced trusted execution environments (TEEs) like secure enclaves, improves cluster security in the cloud-native ecosystem, particularly in Kubernetes. TEEs provide a secure and trusted execution environment for critical cryptographic operations and protect s.. read more  

Link
@faun shared a link, 2 years, 4 months ago
FAUN.dev()

Azure access from GitHub and GitLab pipelines - without secrets

Federate credential workload identity federation allows CICD pipelines in GitHub and GitLab to access Azure subscriptions without storing credentials in pipeline configurations. GitHub Actions can handle this transparently and GitLab can supply the necessary token directly in the pipeline run... read more  

Azure access from GitHub and GitLab pipelines - without secrets
Link
@faun shared a link, 2 years, 4 months ago
FAUN.dev()

Supply chain security for Go: Compromised dependencies

The rise in supply chain attacks on software has made it crucial for open-source developers using Go to monitor and assess the risks of their dependencies. Go provides built-in protections to help trust the integrity of packages, including the ability to detect and prevent malicious versions or with.. read more  

Link
@faun shared a link, 2 years, 4 months ago
FAUN.dev()

How to handle Large Objects (LOBs) migration from Db2, Oracle to Azure SQL & Datalake

Database modernization from Db2 and Oracle tables with LOB datatypes to Azure SQL PaaS offering (DB / MI) or SQL Server provides an opportunity to optimize databases by storing LOB data as Azure Datalake storage blob objects. This approach reduces maintenance time, offers flexibility in backup, disa.. read more  

How to handle Large Objects (LOBs) migration from Db2, Oracle to Azure SQL & Datalake
Link
@faun shared a link, 2 years, 4 months ago
FAUN.dev()

Hacking Auto-GPT and escaping its docker container

Auto-GPT arbitrary code execution and docker escape: Researchers discovered a vulnerability in Auto-GPT that allowed attackers to execute arbitrary code by injecting prompts and manipulating the user approval process. They also found a method to escape the Auto-GPT docker image and gain access to th.. read more  

Hacking Auto-GPT and escaping its docker container
Link
@faun shared a link, 2 years, 4 months ago
FAUN.dev()

Automating Custom VM Image Creation with Azure Image Builder and Azure DevOps

Developer automates the process of creating custom virtual machine images using the Azure Image Builder feature, eliminating the need for manual provisioning and configuration. This automation process involves defining resources in Azure, customizing the virtual machine image, and building the final.. read more  

Automating Custom VM Image Creation with Azure Image Builder and Azure DevOps
Link
@faun shared a link, 2 years, 4 months ago
FAUN.dev()

ServiceNow Insecure Access Control To Full Admin Takeover

A vulnerability in ServiceNow allows a low-privilege user to gain unauthorized full administrative access to the platform. By exploiting certain vulnerabilities, such as insecure access control and session token manipulation, an attacker can escalate their privileges from a standard user to an admin.. read more