Daniel Grzelak (@dagrz) 's Twitter Profile
Daniel Grzelak

@dagrz

Super Serious Internet Guy™️
Founder of Milo Twitter. Peak Milo. At the intersection of cyber security, Milo, and stonks. Chief Innovation Officer @ Plerion.

ID: 121391248

linkhttps://linktr.ee/dagrz calendar_today09-03-2010 10:37:27

6,6K Tweet

2,2K Followers

1,1K Following

Plerion (@plerionhq) 's Twitter Profile Photo

Have you ever wondered what hackers know about your AWS account? It's a big leap to go from exposed cloud resource to hacked cloud resource if it's identifier is not easy to guess.

Daniel Grzelak (@dagrz) 's Twitter Profile Photo

Shodan for AWS is here!! You know those side projects you never finish? Well I started this one in October 2021 and it's finally finished. Well it won't ever be done, but it's available for anyone to use. Enter an account ID into awseye.com and see what it can find

Clint Gibler (@clintgibler) 's Twitter Profile Photo

📚 tl;dr sec 258 🤖 Google's AI-powered Fuzzing Oliver Chang, Jonathan Metzman ☁️ What Hackers know about your AWS Account Daniel Grzelak 🔬 Finding vulns in EDR Neodyme ☁️ How to use AWS Resource Control Policies Scott Piper 🤖 Augmenting SAST with AI and more! tldrsec.com/p/tldr-sec-258

Rami McCarthy (@ramimacisabird) 's Twitter Profile Photo

I've spent dozens of hours reading State of Cloud Security reports They use customer data to extract insights And I've realized the findings substantially reflect how well that tool helps customers secure their clouds I wrote up some examples, both good and bad (🔗 in 🧵)

I've spent dozens of hours reading State of Cloud Security reports

They use customer data to extract insights 

And I've realized the findings substantially reflect how well that tool helps customers secure their clouds

I wrote up some examples, both good and bad (🔗 in 🧵)
Scott Piper (@0xdabbad00) 's Twitter Profile Photo

EC2s can have more than one IAM role, and there are more magic IPs on AWS for getting creds beyond 169.254.169.254. Learn more: wiz.io/blog/the-many-…

Daniel Grzelak (@dagrz) 's Twitter Profile Photo

I made a matchup luck calulator for ESPN H2H fantasy basketball leagues. Sometimes you play a really strong, and lose each category by a tiny bit so your team looks terrible when you would have beaten every other team. github.com/dagrz/nba-matc… Josh Lloyd

I made a matchup luck calulator for ESPN H2H fantasy basketball leagues. Sometimes you play a really strong, and lose each category by a tiny bit so your team looks terrible when you would have beaten every other team.

github.com/dagrz/nba-matc…

<a href="/redrock_bball/">Josh Lloyd</a>
Plerion (@plerionhq) 's Twitter Profile Photo

Did you know an attacker can execute code on an AWS EC2 instance with just StartInstances, StopInstances, and ModifyInstanceAttribute permissions? Yep, full-blown remote code execution on the instance!

Plerion (@plerionhq) 's Twitter Profile Photo

DynamoDB read operations like "GetItem", "Query", and "Scan" aren’t the only way to retrieve data. Some write operations can also return data, and if you're not careful, you might be leaking information without even realizing it. H/T Aidan W Steele

Plerion (@plerionhq) 's Twitter Profile Photo

How do you turn an AWS access key into an account ID, without touching the API, even if it's long gone? It's super easy. So easy, I'll show you how in 2 minutes with this video anyone can follow.

Daniel Grzelak (@dagrz) 's Twitter Profile Photo

I wrote some code and a guide to figure out who has access to your AWS production, through transitive trusts. It's always scary to figure this out but well worth it. plerion.com/blog/root-in-p…

Daniel Grzelak (@dagrz) 's Twitter Profile Photo

Bad prioritization kills security teams. So I did some experiments to see if AI could help. If you think about it, prioritization is just sorting. So why not use sorting algorithms to prioritize? The LLM can be the comparison function. plerion.com/blog/automatic…

cje (@caseyjohnellis) 's Twitter Profile Photo

My maiden voyage interviewing with Patrick Gray is live, and it's a fun one: HD Moore on why vuln scanners are awful and broken - Risky Business Media m.cje.io/45679XN Enjoy!

My maiden voyage interviewing with <a href="/riskybusiness/">Patrick Gray</a> is live, and it's a fun one: HD Moore on why vuln scanners are awful and broken - Risky Business Media m.cje.io/45679XN

Enjoy!
Plerion (@plerionhq) 's Twitter Profile Photo

Just dropped a 🔥 conversation with a non-technical CISO. I learned so much from this guy! You don't have to be technical to be a CISO but if you make silly metrics your goal, you'll get silly results. Tag your favourite CISO.