Skip to content

Security Café

Security Research and Services

  • Things we do on a daily basis
    • Red Team (DORA/TIBER) exercises
    • Web Application Penetration Testing
    • Mobile Application Penetration Testing
    • Infrastructure Penetration Testing
    • Vulnerability Assessment
  • CVEs, Talks and Tools
  • Contact
  • About

Author: Stefan Tita

Azure CloudQuarry: Searching for secrets in Public VM Images

November 19, 2024 Stefan Tita

After the initial investigation entitled “AWS CloudQuarry: Digging for secrets in Public AMIs” was finalized, we continued with the same idea on Azure in order

Continue reading

AWS vs Azure: A “Secure by default” comparison

September 3, 2024 Stefan Tita

Whether you are in charge of deciding what Cloud solution to choose for your organization or you are a Security Professional trying to decide what

Continue reading

Introduction to AI Prompt Injections (Jailbreak CTFs)

May 15, 2023 Stefan Tita

The world of AI is developing pretty fast and new tools and plugins that leverage the power of LLMs (Large Language Models) are being developed

Continue reading

A Complete Kubernetes Config Review Methodology

February 27, 2023 Stefan Tita

The are many resources out there that tap into the subject of Kubernetes Pentesting or Configuration Review, however, they usually detail specific topics and misconfigurations

Continue reading

Pentesting Azure: RECON Techniques

April 29, 2022 Stefan Tita

Even though Microsoft Azure is the second largest cloud solution after Amazon Web Services (AWS) from a market share perspective, it should be noted that

Continue reading

Protecting Windows Credentials against Network Attacks

December 2, 2021 Stefan Tita

Over the years I’ve seen a lot of misconfigurations or a lack of configurations when it comes to protecting Windows credentials, hashes or Kerberos tickets.

Continue reading

Top Posts

  • Mobile Pentesting 101: How to Install Split APKs
  • Root detection and SSL pinning bypass
  • Chained Vulnerabilities in Web Applications
  • Introduction to AI Prompt Injections (Jailbreak CTFs)
  • AWS CloudQuarry: Digging for Secrets in Public AMIs

Blog Stats

  • 557,456 hits

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 156 other subscribers

Categories

  • Active Directory (4)
  • Announcements (2)
  • C2 (1)
  • Cloud Security (12)
    • aws (9)
    • Azure (3)
    • Kubernetes (1)
  • Conferences (4)
  • Embedded systems security (3)
    • IoT Pentesting (2)
  • Ethical Hacking (18)
  • General security (13)
  • IT Security Assurance (1)
  • IT Security Audit (2)
  • Metasploit (1)
  • Misc (20)
    • Artificial Intelligence (1)
    • Code Review (1)
    • CVE (1)
  • Mobile security (12)
  • Network security (7)
  • Operating systems (2)
  • Penetration Testing (24)
  • Pentest techniques (31)
  • Research (3)
  • Web security (13)
  • Wireless security (1)
Blog at WordPress.com.
  • Subscribe Subscribed
    • Security Café
    • Join 156 other subscribers
    • Already have a WordPress.com account? Log in now.
    • Security Café
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...