Brutkey

ReynardSec
@reynardsec@infosec.exchange
ReynardSec
@reynardsec@infosec.exchange

InPost, a company best known for its so-called "Paczkomaty" (parcel lockers - self-service machines where you can send and collect parcels 24/7), is launching a campaign to install AED units (Helpbox 365) [1] on its machines [2]. The first 100 devices are being installed on lockers in areas that, according to the company's data, currently have the fewest AEDs in the country. The next locations for installations will be indicated by the public.

There are ~30k InPost parcel lockers across Poland [3].

[1]
https://en.wikipedia.org/wiki/Automated_external_defibrillator
[2]
https://x.com/RBrzoska/status/1955509625031360724
[3]
https://inpost.pl/znajdz-paczkomat

#europe #poland #health #inpost #cool #lifesaving #government

ReynardSec
@reynardsec@infosec.exchange

Hey ZAP* users heads up: the official ZAP images are being retired from Docker Hub. You should update your pipelines with the new registry: https://www.zaproxy.org/download/#docker

* formerly "OWASP ZAP"

#appsec #cybersecurity #webdev #devops

ReynardSec
@reynardsec@infosec.exchange

A grumpy ItSec guy walks through the office #2

devops0: dude, we've got so many roles in this cluster my terminal buffer runs out when I try to list them all.
devops1: bro, if it works, don't touch.
devops0: sure, but neither I nor anyone else on the project knows who can access what...

ItSec (walking by): just use rbac-tool and review this...

devops1: r... rba... what?
devops0: rbac-tool probably or smth

--

It's always a good moment to verify who can do what in your Kubernetes cluster.

For basic checks, use native kubectl:

1) Can "I" read secrets?

kubectl auth can-i get secrets

2) To check another identity's permissions (e.g., a ServiceAccount) run:

kubectl auth can-i get secrets --as=system:serviceaccount:somenamespace:someserviceaccount

However, this approach will not work for complex environments. There's a more effective way to do this with rbac-tool [2]. It gives you cluster-wide visibility with simple commands. Check this:

1) Who can do a specific thing? For example: who in the entire cluster can read Secrets?

rbac-tool who-can get secrets

2) Run an RBAC health check - global analysis with risk hints (wildcards in RBAC, overly broad permissions, cross-namespace binds, etc)

rbac-tool analysis

3) Visualize the mess - produce an interactive map of roles, bindings, etc:

rbac-tool visualize

This command writes a report to rbac.html in the current directory.

Alternatives to rbac-tool like rakkess [3] can offer similar "who can" insights, though it may not be actively maintained.

Stay (more) safe!

[1]
https://kubernetes.io/docs/reference/kubectl/generated/kubectl_auth/kubectl_auth_can-i/
[2]
https://github.com/alcideio/rbac-tool
[3]
https://github.com/corneliusweig/rakkess

#devops #programming #webdev #cybersecurity #infosec #sysadmin #kubernetes #containers

ReynardSec
@reynardsec@infosec.exchange

Bad actor exploited Google's "Refresh Outdated Content" tool (https://search.google.com/search-console) to suppress unwanted publication.

https://freedom.press/issues/censorship-whac-a-mole-google-search-exploited-to-scrub-articles-on-san-francisco-tech-exec/

#webdev #infosec #cybersecurity #press #legal #privacy

ReynardSec
@reynardsec@infosec.exchange

Changes in EWS for Hybrid Exchange: "Starting in August 2025, we will begin temporarily blocking Exchange Web Services (EWS) traffic using the Exchange Online shared service principal (which is by default used by some coexistence features in hybrid scenarios)".

https://techcommunity.microsoft.com/blog/exchange/dedicated-hybrid-app-temporary-enforcements-new-hcw-and-possible-hybrid-function/4440682

#microsoft #m365 #windows #exchange #sysadmin

ReynardSec
@reynardsec@infosec.exchange

If you're using the #activedirectory and AD CS, check this out πŸ‘‡πŸ‘‡

http://github.com/Sleepw4lker/TameMyCerts

"TameMyCerts is a policy module for Microsoft Active Directory Certificate Services (AD CS) enterprise certification authorities that enables security automation for a lot of use cases in the PKI field."

"It supports, amongst other functions, inspecting certificate requests for certificate templates that allow the subject information to be specified by the enrollee against a defined policy. If any of the requested identities violates the defined rules, the certificate request automatically gets denied by the certification authority."

#windows #sysadmin #devops #infosec #cybersecurity #threatintel #sysops #itsecurity

ReynardSec
@reynardsec@infosec.exchange

β€žUnder the Hood of AFD.sys Part 4: Receiving TCP packets”

https://leftarcode.com/posts/afd-reverse-engineering-part4/

#reverseengineering #windows #programming #cybersecurity