Web Security
projectdiscovery/proxify
Swiss Army knife proxy tool for HTTP/HTTPS traffic capture, manipulation, and replay on the go. Supports multiple operations such as request/response dump, filtering and manipulation via DSL language, and upstream HTTP/Socks5 proxy. Includes a replay utility allowing importing into Burp or any other proxy by simply setting the upstream proxy to proxify .
Cloud Security
Compliance-as-code and auto-remediation with Cloud Custodian
AWS blog post about using Cloud Custodian + Lambdas to enforce compliance-as-code and auto-remediation. Cloud Custodian is an open source, stateless rules engine that offers policy-level execution against multiple kinds of event streams, including CloudWatch Events, CloudTrail events, and more.
Best Practices for AWS Security - Part 1 with Scott Piper
Scott Piper joins Corey Quinn on Last Week in AWS to discuss flaws.cloud, the fwd:cloudsec conference, what Scott thinks AWS does and doesn’t do well, and what Scott believes is the best security boundary on AWS.
Infrastructure as Code
Building an IaC security and governance program step-by-step
Bridgecrew’s Guy Eisenkot gives a nice overview of how to roll out an infrastructure as code scanning platform, including various trade-offs: leveraging your existing CI/CD pipeline or code hosting platform, annotating PRs with comments vs blocking the build, setting expectations and SLAs with dev teams, and leveraging approval rules and CODEOWNERS files.

Shifting Threat Modeling Left: Automated Threat Modeling Using Terraform
In this HashiConf Digital 2020 talk, Accurics co-founder Om Moolchandani describes how one can (in theory) extract information like resource (mis)configurations, resource relationships, network relationships, identity access and privilege relationships, trust boundaries, exposure, and more from Terraform code. He then demo’d using their open source tool terrascan.
I think building a model of an environment via analyzing infrastructure as code files (Terraform, CloudFormation, etc.) is a very promising and currently underutilized idea. While this talk references the idea of doing that, based on my read, it does not appear terrascan is currently leaning into this, but is rather scanning for a set of known misconfigurations (like most other existing tools).
accurics/KaiMonkey
Purposefully vulnerable Terraform infrastructure by Accurics.
Container Security
Exploring Rootless Docker
Rootless containers have left experimental status in Docker 20.10. Rory McCune describes peaking a bit under the hood to see what’s going on and how it compares to standard Docker re: user namespaces, capabilities, AppArmor, seccomp, and trying to break out.
Blue Team
NSA Recommends How Enterprises Can Securely Adopt Encrypted DNS
The NSA published a document explaining the benefits and risks of adopting the encrypted domain name system (DNS) protocol, DNS over HTTPs (DoH), in enterprise environments. Here’s a diagram from the 7 page PDF:

Red Team
macOS Post-Exploitation Shenanigans with VSCode Extensions
MDSec’s Dominic Chell describes the process of creating a malicious VSCode extension on macOS that can be useful post-exploitation. In short: create a repo template with Yeoman, run JXA through osascript , then use Mythic or another C2 for persistence if you want.
Misc
Maximizing Appreciation of Life
One thing I admire about my bud Daniel Miessler is how reflective he is. He’s played an influential role in helping me mentally flesh out what I want tl;dr sec to be, and how I want to navigate my career and life (“If everything were to go perfectly, where would you want to be in 10 years?”). Here’s Daniel’s life purpose 👇 I’m still working on mine. Do you know what yours is?
I enjoy finding patterns in how people pursue meaning, constructing models for how said meaning works, and then creating, discussing, and sharing possible frameworks for improving it.
Responding to Community Outrage: Strategies for Effective Risk Communication
Recommended by Devdatta Akhawe: “One of my favorite books about risk communication for security leaders is actually written in the context of public health/safety.”
Pirate Bay Founder Thinks Parler’s Inability to Stay Online Is ‘Embarrassing’
Over the years, Kolmisoppi and The Pirate Bay crew explored no limit of strategies to keep its servers operational and out of the reach of law enforcement and the entertainment industry, even when that meant hiding them in caves and submarines, or even using low-orbit drones to redirect users to hidden regional servers hosting torrent indexes and trackers.
Quote
“If you always hire people who are smaller than you are, we shall become a company of dwarfs.
If, on the other hand, you always hire people who are bigger than you are, we shall become a company of giants.” — David Ogilvy
Cash Rules Everything Around Me
An Oscar Winner Made a Khashoggi Documentary. Streaming Services Didn’t Want It.
It is fundamentally hard (and unlikely) for global companies to step on any nation state toes that could lead to massive revenue loss.
That’s why, for example, Apple removed the Taiwan flag emoji for Chinese iPhones and all mainland China iCloud users have their data stored by a firm started by the Chinese government (#lolprivacy).
Bryan Fogel’s first documentary, “Icarus,” helped uncover the Russian doping scandal that led to the country’s expulsion from the 2018 Winter Olympics. It also won an Oscar for him and for Netflix, which released the film.
For his second project, he chose another subject with global interest: the killing of Jamal Khashoggi, the Saudi Arabian dissident and Washington Post columnist, and the role that the Saudi crown prince, Mohammed bin Salman, played in it.
But when Fogel reached out to Netflix and many other streaming services, he didn’t hear back.
In January 2019, Netflix pulled an episode of the comedian Hasan Minhaj’s series, “Patriot Act,” when he criticized Prince Mohammed after Mr. Khashoggi’s death. Mr. Hastings later defended the move, saying: “We’re not trying to do ‘truth to power.’ We’re trying to entertain.”
“This is unquestionably political,” said Stephen Galloway, dean of Chapman University’s film school. “It’s disappointing, but these are gigantic companies in a death race for survival. You think Disney would do anything different with Disney+? Would Apple or any of the megacorporations? They have economic imperatives that are hard to ignore, and they have to balance them with issues of free speech.”
Also:
In November, Netflix signed an eight-picture film deal with the Saudi Arabian studio Telfaz11 to produce movies that it said “will aim for broad appeal across both Arab and global audiences.”
The point here is not to wag a finger at one particular company, but rather to point out that with strong economic incentives, you don’t need to be able to “force” someone (person, company, nation) to do something, they’ll do what’s in their best interests.
This has strong implications for:
- The movies and TV shows we see (and don’t see).
- China is a massive market, don’t expect big media players to produce critical pieces.
- Social media communication paradigms and algorithms.
- More engagement ➡️ more money (and more polarization / rapid spread of fake news).
- And much more.
I don’t have any answers here. This is hard 🤷
And on that positive note, have a great weekend!
Thanks for reading!
Cheers,
Clint
@clintgibler
|