Blog

Blog

Ted Kaminski
AWS Security Best Practices

AWS Security Best Practices

Work at AWS over the past year, I've had the opportunity to see the most common cloud security vulnerabilities firsthand...

DIVA - Damn Insecure Vulnerable App for Android

Android DIVA - Damn Insecure and vulnerable App for Android

DIVA is the mobile app version of DVWA. It's an app intentionally designed to be insecure so security analysts can experiment...

OWASP Top 10 Overview

OWASP Top 10 Overview

Overview of the OWASP top 10

Open Source Intelligence (OSINT) resources

Open Source Intelligence (OSINT) resources

Threat intelligence is utilizing information to detect security threats that traditional methods and technologies may not and providing decision driven incident response...

Log4j Zero-day vulnerability analysis

Log4j Zero-day vulnerability analysis

The popular Java logging library log4j (version 2) was exploited on Dec 9th resulting in remote code execution by logging....

RootMe Writeup [TryHackMe]

RootMe Writeup [TryHackMe]

Writeup for the Rootme TryHackMe module