Bulletin Board Code
Copy and paste the following code into your bulletin board post.
DIGITAL COMBAT SIMULATOR
FAR CRY 5
FOOD & DRINK
FORTNITE BATTLE ROYALE
FREEDOM OF SPEECH
GOD OF WAR
HEALTH & WELLNESS
RED DEAD REDEMPTION
WORLD WAR 2
'Fighting the Previous War - Attacking and Defending in the Cloud Era Part 1 '
#early AWS AMI ID attack
early AWS AMI ID attack
Early AWS AMI ID, so a simple attack was to generate a low enough one to get it pushed to the top.
#AWS virtual machine bomb
AWS virtual machine bomb
#SendGrid bug bounty from Uber
SendGrid bug bounty from Uber
illustrates microservices security problems.
#Canarytokens are a modernization on honey tokens
Canarytokens are a modernization on honey tokens
#How to tell if SalesForce accounts are compromised using Canarytokens
How to tell if SalesForce accounts are compromised using Canarytokens
#Common shared library attack
Common shared library attack
in open source software
#Malicious Atom editor plugin
Malicious Atom editor plugin
#Advertising in Minimap plugin
Advertising in Minimap plugin
after plugin purchased and taken in a new direction.
#Post exploitation honeytokens in Slack
Post exploitation honeytokens in Slack
#Persistence in AWS
Persistence in AWS
#Self XSS to achieve persistence in IaaS
Self XSS to achieve persistence in IaaS
#AWS specific attacks
AWS specific attacks
#Amazon's recommended deployment for WordPress showing complexity
Amazon's recommended deployment for WordPress showing complexity
#AWS explosed code complexity vs GNU LibC
AWS explosed code complexity vs GNU LibC
#Reconnaissance in AWS
Reconnaissance in AWS
#Bruteforcing AWS Account IDs
Bruteforcing AWS Account IDs
#Account IDs are often posted public
Account IDs are often posted public
#S3 bucket username logging to get account ID
S3 bucket username logging to get account ID
#S3 bucket discovery
S3 bucket discovery
#Queue names are often posted public
Queue names are often posted public
#AWS credential compromise
AWS credential compromise
#Authenticating through AWS Identity Documents
Authenticating through AWS Identity Documents
does not have source validation.
#AWS Permission enumeration
AWS Permission enumeration
#Lateral movement in AWS
Lateral movement in AWS
Fighting the Previous War - Attacking and Defending in the Cloud Era Part 1
Fighting the Previous War - Attacking and Defending in the Cloud Era. Marco Slaviero. Thinkst. AWS.
Another Intel Vuln Lets Attackers in Your computer
Certificate Bypass: Hiding and Executing Malware from a Digitally Signed Executable
by Tom Nipravsky Malware developers are constantly looking for new ways to evade the detection and prevention capabilities of security solutions.
PoisonTap USB operation and feature overview
PDF File Format Attacks -- OMG WTF PDF [27C3]
OMG WTF PDF What you didn't know about Acrobat Ambiguities in the PDF specification means that no two PDF parsers will see a file in the same way.
Radar Jamming: "Defensive Electronic Countermeasures" May 1962 US Navy Training Film
Hacking Democracy - the beginning
DEF CON 23 - Mahdi Namazifar - Detecting Randomly Generated Strings
Numerous botnets employ domain generation algorithms (DGA) to dynamically generate a large number of random domain names from which a small subset
USB Killer vs iPhone 7 Plus - Instant Death?
What Happens If You Plug a USB Killer v2.0 Into iPhone 7 Plus? or Note 7? The Fastest Way To Kill a Computer!
Self-Defense Lessons with a Former CIA Agent | Rachael Ray Show
Hunting rogue WiFi devices using the HackRF SDR - Part 1 of 2
Mike Davis talking on: "Hunting rogue WiFi devices using the HackRF SDR". Hacking, Wifi hacking, HackRF, Wireless basics. Part 2:
House of Salt: Extending and leveraging SaltStack
Marco Slaviero, Max Mclaughlin
Extraction at Light speed : Faster Blind SQL Injection
Talk by Keith Makan on improving the speed of blind SQL injection at OWASP CPT meeting held on the 23rd of March 2016.
POKÉMON Detective Pikachu - Official Trailer #1
POKÉMON Detective Pikachu - In Theaters May 10, 2019
Migos Carpool Karaoke
James Corden links up with Quavo, Offset and Takeoff - the trio that make up Migos - for a drive through Los Angeles singing their biggest songs.
Ellen & Michelle Obama Go to Costco
Michelle Obama is on a book tour for her new memoir, "Becoming," so Ellen thought the best place to set up an impromptu book signing was one of
CWC vs PROJECT ZORGO in Real Life NINJA BATTLE ROYALE & Chase Searching for Abandoned Riddles
I battle this Ninja Hacker to stop him from framing me!
Tekashi 6ix9ine Explains Why He Fired His Team, Recent Shooting & New Album
Weekend Update: Pete Davidson Apologizes to Lt. Com. Dan Crenshaw - SNL
Pete Davidson stops by Weekend Update to apologize for his comments about Lt. Com. Dan Crenshaw. #SNL #SNL44 #LievSchreiber #LilWayne
Man brings pizza to teen’s house, meets Chris Hansen instead
A Boston man drives two and a half hours to Connecticut to bring pizza to a 13-year-old girl, and meets Chris Hansen instead.
XXXTENTACION - BAD! (Audio)