How to search for Open Amazon s3 Buckets and their contents — https://buckets.grayhatwarfare.com GrayHatWarfare created https://buckets.grayhatwarfare.com/ a free tool that lists open s3 buckets and helps you search for interesting files. For an intro on what Amazon open buckets are, please read the following: https://blog.rapid7.com/2013/03/27/open-s3-buckets/ In essence, many files are publicly accessible, some by design. These files sometimes […]
Tag: data
Recently we have all have been reading about Facebook’s breach of trust. Even Mark Zuckerberg, admitted that Facebook has made mistakes. The issue: Cambridge Analytica, a U.K.-based political data-analytics firm hired by the 2016 Trump campaign, got its hands on data for 50 million Facebook users — without the users’ knowledge or consent. At this point, it’s […]
Personal Data: Broadly defined as any data element(s) that can directly or indirectly identify an individual. Examples include: name, e-mail address, government identifiers (such as a passport or Social Security Number/Social Insurance Number), credit card information, and biometric data (such as fingerprints). It can also include any records associated with or linked to such personal […]
Microsoft Azure Rights Management provides a comprehensive policy-based enterprise solution to help protect your valuable information, no matter whom you share it with. These policies help improve data security using both Both Information Rights Management and Office 365 Message Encryption To activate rights management: Log into Office 365 with an account which has been assigned an […]
Dirty Cache – Dell, Equallogic Storage Array I hope you never encounter such an issue, but if you found yourself searching for a method to get online you’re in luck. Symptoms: Equallogic Storage Array no longer responds to pings iSCSI attached volumes have all gone offline Unable to access the Equallogic Storage Array using SAN HQ […]
In my last post I wrote a very brief how-to on how to Capture Traffic from Smart Devices with Fiddler by making it a network proxy. I did just that and the results for a few app’s have upset me. Mainly because it exposes not only my password and user id, it exposed the content […]