Protecting Against an Unfixed Kubernetes Man-in-the-Middle Vulnerability (CVE-2020-8554)

posted by Syed Jaffri init by Y Avrahami December 21, 2020 at 3:30 PM Category: Cloud, Unit 42 Tags: CVE-2020-8554, Kubernetes, Prisma Cloud, vulnerabilities Executive Summary On Dec. 4, 2020, the Kubernetes Product Security Committee disclosed a new Kubernetes vulnerability assigned CVE-2020-8554. It is a medium severity issue affecting all Kubernetes versions and is currently unpatched. CVE-2020-8554 is a design flaw that allows Kubernetes Services […]

Read More Protecting Against an Unfixed Kubernetes Man-in-the-Middle Vulnerability (CVE-2020-8554)

How to Install Ansible with AWX on Ubuntu 18.04 | 16.04

This brief tutorial shows students and new users how to install Ansible with AWX on Ubuntu 18.04 | 16.04. Ansible is an open source software provisioning, configuration management, and application-deployment tool that allows configuration managers painless process to manage and deploy applications and services across diverse environments. AWX provides a web-based user interface, REST API, and […]

Read More How to Install Ansible with AWX on Ubuntu 18.04 | 16.04

Back Door

Reverse SSH Port Forwarding specifies that the given port on the remote server host is to be forwarded to the given host and port on the local side. To try to put this as simple as can be, Reverse SSH is a technique through which you can access systems that are behind a firewall from […]

Read More Back Door

Security+: Authentication Services (RADIUS, TACACS+, LDAP, etc.)

Introduction The authentication module is one of the most important components of any information security infrastructure. It’s needless to say that if you perfect your authentication process, unwanted infiltration can be greatly reduced. In this article, the various protocols via which authentication can be achieved on a huge scale (including LDAP, RADIUS, TACACS+, XTACACS, etc.) […]

Read More Security+: Authentication Services (RADIUS, TACACS+, LDAP, etc.)

USEFUL TOOLS FOR CTF

I’ve selected useful and must-have tools for CTF games and computer security competitions. Most of this tools are often indispensable during the games (especially task-based/jeopardy CTF games). I’ve combined tools by categories just like in CTF games: Reverse, Steganography, Networking, Forensics, Cryptography, Scripting. Most of tools are cross-platform, but some of them are only for Windows or […]

Read More USEFUL TOOLS FOR CTF