Let's Unveil the Secrets: Your Ultimate Destination for Cutting-Edge IT Security Insights

See what we’ve
written lately
Alexander Hose
Meet our author Meet our authors Meet our top authors

How to hack GCP compute instances

Introduction Google Cloud offers a secure and efficient way to manage permissions and authentication through service accounts. These accounts are typically associated with GCP resources like Compute Engine instances, allowing them to securely access other Google Cloud services. But how can we abuse the service account credentials and use them...

How to Pass Information Between Steps in AWS SSM Documents

Introduction In my work with AWS Systems Manager (SSM) documents, I faced a challenge that might resonate with anyone managing complex automation: passing information between steps. Each step in an SSM document executes independently, and I wanted to keep my commands clean, organized, and effective. However, without an easy way...

How to Automate EC2 Instance Management with AWS SSM Documents

Introduction In my daily work managing cloud infrastructure, I often faced the challenge of efficiently configuring services and running commands across many machines. With numerous EC2 instances running different applications, it was important to ensure consistent security settings and configurations. However, manually logging into each instance, executing commands, and checking...

You’ve successfully subscribed to Alexander Hose
Welcome back! You’ve successfully signed in.
Great! You’ve successfully signed up.
Success! Your email is updated.
Your link has expired
Success! Check your email for magic link to sign-in.