Master Linux File Permissions and File Types While Your Coffee Brews
Linux Permissions and File Types Explained by Infographic and Exercises. Perfect for Your Morning Coffee Read.
Practical engineering articles on Linux, AWS, penetration testing, and the tools that keep modern systems running.
A routine API pentest revealed that AWS Cognito Identity Pools were handing out S3 credentials to anyone on the internet. Here is how I found it, what I got wrong along the way, and the step-by-step fix.
Linux Permissions and File Types Explained by Infographic and Exercises. Perfect for Your Morning Coffee Read.
Twelve days ago I opened a terminal, pointed curl at our staging API, and started breaking things. I didn’t have a plan. I didn’t have a ...
I shipped a false positive to my team. In bold. With a CRITICAL severity tag. And I was wrong. Not “wrong about a detail” wrong. Wrong a...
Rate limiting is supposed to stop brute-force attacks. Ours didn’t. Not because the rate limiter was broken – it worked perfectly. The pr...
I was testing my own finance records. Checking that the API returned the right data for my user. Standard BOLA test – try accessing someo...
I logged out. Then I used my old refresh token. It still worked. I used it again. Still worked. Five times. Ten times. A week later. Sti...
I wasn’t supposed to be awake at 3 AM. But I’d had too much coffee and my brain wouldn’t shut off, so I figured I’d do one more test befo...
The best part about doing security testing on your own systems is that you can be as reckless as you want. The worst part is realizing yo...
I deleted my own account today. Not on purpose. I’m not that chaotic. I was testing something, and then… I couldn’t log in anymore. Let...