Skip to content

Security Café

Security Research and Services

  • Things we do on a daily basis
    • Red Team (DORA/TIBER) exercises
    • Web Application Penetration Testing
    • Mobile Application Penetration Testing
    • Infrastructure Penetration Testing
    • Vulnerability Assessment
  • CVEs, Talks and Tools
  • Contact
  • About

Category: Azure

Azure CloudQuarry: Searching for secrets in Public VM Images

November 19, 2024 Stefan Tita

After the initial investigation entitled “AWS CloudQuarry: Digging for secrets in Public AMIs” was finalized, we continued with the same idea on Azure in order

Continue reading

AWS vs Azure: A “Secure by default” comparison

September 3, 2024 Stefan Tita

Whether you are in charge of deciding what Cloud solution to choose for your organization or you are a Security Professional trying to decide what

Continue reading

Pentesting Azure: RECON Techniques

April 29, 2022 Stefan Tita

Even though Microsoft Azure is the second largest cloud solution after Amazon Web Services (AWS) from a market share perspective, it should be noted that

Continue reading

Top Posts

  • Introduction to Windows shellcode development – Part 3
  • Pivoting to internal network via non-interactive shell
  • My experience with the OSCP certification
  • AWS Enumeration - Part I (Where to start, Approaches and Tools)
  • Mobile penetration testing on Android using Drozer

Blog Stats

  • 654,160 hits

Follow us via Email

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 157 other subscribers

Categories

  • Active Directory (4)
  • Announcements (2)
  • C2 (1)
  • Cloud Security (12)
    • aws (9)
    • Azure (3)
    • Kubernetes (1)
  • Conferences (4)
  • Embedded systems security (3)
    • IoT Pentesting (2)
  • Ethical Hacking (18)
  • General security (14)
  • IT Security Assurance (1)
  • IT Security Audit (3)
  • Metasploit (1)
  • Misc (21)
    • Artificial Intelligence (2)
    • Code Review (1)
    • CVE (1)
  • Mobile security (13)
  • Network security (7)
  • Operating systems (2)
  • Penetration Testing (25)
  • Pentest techniques (30)
  • Research (3)
  • Web security (13)
  • Wireless security (1)
Powered by WordPress.com.
 

Loading Comments...