<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Nick Frichette - Blog</title><link>https://frichetten.com/blog/</link><description>Personal blog, focused on information security. AWS, Web apps, offensive techniques, and more.</description><generator>Hugo</generator><language>en-us</language><atom:link href="https://frichetten.com/blog/index.xml" rel="self" type="application/rss+xml"/><item><title>Amplified exposure: How AWS flaws made Amplify IAM roles vulnerable to takeover</title><link>https://frichetten.com/blog/amplify-vuln-2024/</link><pubDate>Mon, 22 Apr 2024 00:00:40 -0600</pubDate><guid>https://frichetten.com/blog/amplify-vuln-2024/</guid><description>Public disclosure of a vulnerability in AWS Amplify which exposed IAM roles associated with Amplify projects to be assumed by anyone in the world.</description></item><item><title>Two Minor Cross-Tenant Vulnerabilities in AWS App Runner</title><link>https://frichetten.com/blog/minor-cross-tenant-vulns-app-runner/</link><pubDate>Mon, 03 Apr 2023 00:00:40 -0600</pubDate><guid>https://frichetten.com/blog/minor-cross-tenant-vulns-app-runner/</guid><description>Writeup for two minor cross-tenant vulnerabilities I found in AWS App Runner.</description></item><item><title>Using an Undocumented Amplify API to Leak AWS Account IDs</title><link>https://frichetten.com/blog/undocumented-amplify-api-leak-account-id/</link><pubDate>Mon, 27 Mar 2023 00:00:40 -0600</pubDate><guid>https://frichetten.com/blog/undocumented-amplify-api-leak-account-id/</guid><description>Writeup for a technique I found to leak an AWS account ID from an Amplify app.</description></item><item><title>A Look at AWS API Protocols</title><link>https://frichetten.com/blog/aws-api-protocols/</link><pubDate>Mon, 23 Jan 2023 00:00:40 -0600</pubDate><guid>https://frichetten.com/blog/aws-api-protocols/</guid><description>An introduction to AWS API protocols and how they work.</description></item><item><title>A Confused Deputy Vulnerability in AWS AppSync</title><link>https://frichetten.com/blog/appsync-vulnerability-disclosure/</link><pubDate>Mon, 21 Nov 2022 00:00:40 -0600</pubDate><guid>https://frichetten.com/blog/appsync-vulnerability-disclosure/</guid><description>Datadog: Technical analysis of a confused deputy vulnerability I found in AWS AppSync.</description></item><item><title>OpenSSL Punycode Vulnerabiliy (CVE-2022-3602)</title><link>https://frichetten.com/blog/openssl-punycode-vuln/</link><pubDate>Tue, 01 Nov 2022 00:00:40 -0600</pubDate><guid>https://frichetten.com/blog/openssl-punycode-vuln/</guid><description>Datadog: A technical analysis of the OpenSSL punycode vulnerability.</description></item><item><title>Revisiting Lambda Persistence</title><link>https://frichetten.com/blog/revisiting_lambda_persistence/</link><pubDate>Thu, 16 Sep 2021 00:00:40 -0600</pubDate><guid>https://frichetten.com/blog/revisiting_lambda_persistence/</guid><description>Revisiting and building on the original Lambda persistence technique.</description></item><item><title>XSS in the AWS Console</title><link>https://frichetten.com/blog/xss_in_aws_console/</link><pubDate>Thu, 03 Jun 2021 00:00:40 -0600</pubDate><guid>https://frichetten.com/blog/xss_in_aws_console/</guid><description>Writeup for a cross-site scripting bug I found in the AWS Console.</description></item><item><title>Intercept SSM Agent Communications</title><link>https://frichetten.com/blog/ssm-agent-tomfoolery/</link><pubDate>Wed, 27 Jan 2021 00:00:40 -0600</pubDate><guid>https://frichetten.com/blog/ssm-agent-tomfoolery/</guid><description>Research on post-exploitation techniques against SSM Agent abusing send-command and start-session.</description></item><item><title>Enumerate AWS API Permissions Without Logging to CloudTrail</title><link>https://frichetten.com/blog/aws-api-enum-vuln/</link><pubDate>Sat, 17 Oct 2020 00:00:40 -0600</pubDate><guid>https://frichetten.com/blog/aws-api-enum-vuln/</guid><description>Writeup for a bug I discovered in the AWS API that would allow you to enumerate certain permissions for a role without logging to CloudTrail.</description></item><item><title>Abusing AWS Connection Tracking</title><link>https://frichetten.com/blog/abusing-aws-connection-tracking/</link><pubDate>Tue, 11 Aug 2020 00:00:40 -0600</pubDate><guid>https://frichetten.com/blog/abusing-aws-connection-tracking/</guid><description>Tunnel out of restricted security groups by abusing connection tracking.</description></item><item><title>Abusing GitLab Runners</title><link>https://frichetten.com/blog/abusing-gitlab-runners/</link><pubDate>Sat, 11 Jul 2020 00:16:40 -0600</pubDate><guid>https://frichetten.com/blog/abusing-gitlab-runners/</guid><description>Some research I did on abusing GitLab Runners to steal information by emulating a runner's behavior.</description></item><item><title>CVE-2020-11108: How I Stumbled into a Pi-hole RCE+LPE</title><link>https://frichetten.com/blog/cve-2020-11108-pihole-rce/</link><pubDate>Sun, 10 May 2020 00:16:40 -0600</pubDate><guid>https://frichetten.com/blog/cve-2020-11108-pihole-rce/</guid><description>Writeup for CVE-2020-11108 covering how I found the vulnerability and how it can be exploited for fun/profit.</description></item><item><title>Escalating Deserialization Attacks (Python)</title><link>https://frichetten.com/blog/escalating-deserialization-attacks-python/</link><pubDate>Sun, 23 Feb 2020 17:16:40 -0600</pubDate><guid>https://frichetten.com/blog/escalating-deserialization-attacks-python/</guid><description>Demonstrating how to exploit deserialization attacks in Python 2/3</description></item><item><title>Intercept Linux CLI Tool Traffic</title><link>https://frichetten.com/blog/intercept-linux-cli-tool-traffic/</link><pubDate>Sat, 11 Jan 2020 17:16:40 -0600</pubDate><guid>https://frichetten.com/blog/intercept-linux-cli-tool-traffic/</guid><description>A guide on how to intercept Linux CLI tool traffic with Burp Suite</description></item><item><title>Bypass GuardDuty PenTest Alerts</title><link>https://frichetten.com/blog/bypass-guardduty-pentest-alerts/</link><pubDate>Wed, 04 Sep 2019 17:16:40 -0600</pubDate><guid>https://frichetten.com/blog/bypass-guardduty-pentest-alerts/</guid><description>A guide to bypass the GuardDuty PenTest Finding Type</description></item><item><title>Hijacking IAM Roles and Avoiding Detection</title><link>https://frichetten.com/blog/hijack-iam-roles-and-avoid-detection/</link><pubDate>Mon, 01 Jul 2019 17:16:40 -0600</pubDate><guid>https://frichetten.com/blog/hijack-iam-roles-and-avoid-detection/</guid><description>A guide on how to steal IAM role keys and use them without being detected</description></item><item><title>IDOR Attacks</title><link>https://frichetten.com/blog/idor-attacks/</link><pubDate>Tue, 04 Jun 2019 17:16:40 -0600</pubDate><guid>https://frichetten.com/blog/idor-attacks/</guid><description>An introduction to IDOR attacks</description></item><item><title>Security Headers: Content Security Policy</title><link>https://frichetten.com/blog/content-security-policy/</link><pubDate>Mon, 03 Dec 2018 17:16:40 -0600</pubDate><guid>https://frichetten.com/blog/content-security-policy/</guid><description>An in depth overview of the Content Security Policy header</description></item><item><title>Angular Universal: Some Insights</title><link>https://frichetten.com/blog/angular-universal/</link><pubDate>Thu, 04 Oct 2018 17:16:40 -0600</pubDate><guid>https://frichetten.com/blog/angular-universal/</guid><description>Some advice based on my experience with Angular Universal</description></item><item><title>OSCP Review</title><link>https://frichetten.com/blog/oscp-review/</link><pubDate>Mon, 23 Jul 2018 17:16:40 -0600</pubDate><guid>https://frichetten.com/blog/oscp-review/</guid><description>My thoughts and experiences with the OSCP</description></item></channel></rss>