Matthias Luft (@uchi_mata) 's Twitter Profile
Matthias Luft

@uchi_mata

Infosec Enthusiast & Practiconer. Account mostly inactive.
@[email protected]
bsky.app/profile/uchi-m…

ID: 21561733

linkhttps://www.rational-security.io/ calendar_today22-02-2009 12:17:53

2,2K Tweet

852 Followers

457 Following

fwd:cloudsec (@fwdcloudsec) 's Twitter Profile Photo

All the talks from last week have been published to our Youtube channel! Here's a playlist with all of them: youtube.com/playlist?list=…

Marco Lancini (@lancinimarco) 's Twitter Profile Photo

🎉 It's finally here! The CloudSec Engineer. A practical guide on how to enter, establish yourself, and thrive in the Cloud Security industry as an individual contributor. Now available: engineer.cloudsecbooks.com #thecloudsecengineer

🎉 It's finally here!

The CloudSec Engineer.

A practical guide on how to enter, establish yourself, and thrive in the Cloud Security industry as an individual contributor.

Now available: engineer.cloudsecbooks.com

#thecloudsecengineer
Colin Percival (@cperciva) 's Twitter Profile Photo

Today seems like a good day to mention that on my servers I use spiped to protect access to OpenSSH -- you can't even send a single byte to sshd unless you have the spiped secret key. daemonology.net/blog/2012-08-3…

Colin Percival (@cperciva) 's Twitter Profile Photo

If you launch a new FreeBSD (13.2|13.3|14.0|14.1)-RELEASE instance and don't change the default behaviour via EC2 user-data, it will download and install the patch for this before sshd is launched. I decided many years ago that installing updates on first boot was important.

Brad Geesaman (@bradgeesaman) 's Twitter Profile Photo

What a great read. RCE in sshd with race conditions requiring hours to days to succeed. I cannot imagine the patience required here. 👏 👏 👏 Also, exposing SSH to 0.0.0.0/0 might be a default in your cloud environment, but CSPs have better remote access patterns available.

Charlie Miller (@0xcharlie) 's Twitter Profile Photo

Regarding the SSH bug 1) First OpenSSH vuln discovered in almost 20 years - wow 2) Bug was (re)introduced almost 4 years ago. So remote root in OpenSSH for 4 years and nobody found it? 3) Exploit takes hours/days to run. Watch your logs!

lcamtuf (@lcamtuf) 's Twitter Profile Photo

OpenSSH bug: yes, it takes forever to exploit against a single host. But you're mostly waiting for a timeout, so you can massively parallelize across internet targets w/o needing a botnet. Assume that this - and not targeted exploitation - is going to be the initial approach.

Rory McCune (@raesene) 's Twitter Profile Photo

The next part of our #Kubernetes #Security fundamentals video series is out now! This time we're looking at the Kubelet API. talking about the ports it makes available and some of the potential for information leakage. youtu.be/OdkFPL7d73E?si…

Matt Fuller (@matthewdfuller) 's Twitter Profile Photo

AWS wishlist: a single IAM API that returns the policies attached to a user/role. Today, it involves 4-5 calls: • listRolePolicies • listAttachedRolePolicies • getRolePolicy • getPolicy • getPolicyVersion

sergey bratus (@sergeybratus) 's Twitter Profile Photo

It's great to see Multiplier by Trail of Bits being open-sourced! github.com/trailofbits/mu… I believe it exemplifies the kind of foundational, next-generation tools we need for proper software understanding, maintenance, and sustainment.

Michael Schwarz (@misc0110) 's Twitter Profile Photo

With the #GhostWrite CPU vulnerability, all isolation boundaries are broken - sandbox/container/VM can't prevent GhostWrite from writing and reading arbitrary physical memory on affected RISC-V CPUs. Deterministic, fast, and reliable - no side channels. ghostwriteattack.com

With the #GhostWrite CPU vulnerability, all isolation boundaries are broken - sandbox/container/VM can't prevent GhostWrite from writing and reading arbitrary physical memory on affected RISC-V CPUs. Deterministic, fast, and reliable - no side channels. ghostwriteattack.com
Abhay Bhargav (@abhaybhargav) 's Twitter Profile Photo

Eliminate entire classes of security flaws with these Python libraries * PyNacl for Cryptography * Pydantic for input validation * Casbin for Object/Function Level AuthZ * Passlib for Password Management