Jason OstrominInfoSec Write-upsIntroducing Edge: A Recon Tool for Cloud Provider AttributionIntroductionMar 10, 2023Mar 10, 2023
Jason OstrominInfoSec Write-upsA Lab for Practicing Azure Service Principal AbuseIntroductionJul 22, 2022Jul 22, 2022
Jason OstrominInfoSec Write-upsBuild, Hack, and Defend Azure IdentityAn Introduction to PurpleCloud Hybrid + Identity Cyber RangeJun 18, 2021Jun 18, 2021
Jason OstrominLevel Up CodingBuilding Azure Cyber Ranges for Learning and FunAdvance your Cyber Security skills and get your Azure Security Engineer Associate certificationOct 26, 2020Oct 26, 2020
Jason OstrominInfoSec Write-upsFun with Creating a VBS Payload to Bypass Endpoint Security And Other LayersPurple Team PhishingAug 7, 2020Aug 7, 2020
Jason OstrominInfoSec Write-upsPentesting in the Clouds: Introducing AriaCloudToday’s Forecast Calls for a Cloudy & Red AdversaryAug 1, 2020Aug 1, 2020
Jason OstrominTowards Data ScienceLeaking Secrets in Web ApplicationsExploiting Vulns in Misconfigured MiddlewareMay 29, 2020May 29, 2020
Jason OstrominTowards Data ScienceBuilding a Vulnerable Rails Application for LearningIntroducing “Hammer”: An Open Source Example of a Vulnerable Ruby on Rails Deployed AppMay 9, 2020May 9, 2020
Jason OstrominstorasecRisk Perception in Cybersecurity: A Few Quick ThoughtsSo much of Cybersecurity rests with our perception of risk. A long time ago, a wise and experienced CSO shared with me something that I…Jan 28, 2020Jan 28, 2020