Public disclosure of a vulnerability in AWS Amplify which exposed IAM roles associated with Amplify projects to be assumed by anyone in the world.| Nick Frichette - Blog
Datadog: Technical analysis of a confused deputy vulnerability I found in AWS AppSync.| frichetten.com
Datadog: A technical analysis of the OpenSSL punycode vulnerability.| frichetten.com
Writeup for two minor cross-tenant vulnerabilities I found in AWS App Runner.| frichetten.com
Writeup for a technique I found to leak an AWS account ID from an Amplify app.| frichetten.com
Writeup for a cross-site scripting bug I found in the AWS Console.| frichetten.com
Research on post-exploitation techniques against SSM Agent abusing send-command and start-session.| frichetten.com
Writeup for a bug I discovered in the AWS API that would allow you to enumerate certain permissions for a role without logging to CloudTrail.| frichetten.com
Tunnel out of restricted security groups by abusing connection tracking.| frichetten.com
Some research I did on abusing GitLab Runners to steal information by emulating a runner's behavior.| frichetten.com
Writeup for CVE-2020-11108 covering how I found the vulnerability and how it can be exploited for fun/profit.| frichetten.com
Demonstrating how to exploit deserialization attacks in Python 2/3| frichetten.com
A guide on how to intercept Linux CLI tool traffic with Burp Suite| frichetten.com
A guide to bypass the GuardDuty PenTest Finding Type| frichetten.com
A guide on how to steal IAM role keys and use them without being detected| frichetten.com
An in depth overview of the Content Security Policy header| frichetten.com
Some advice based on my experience with Angular Universal| frichetten.com
Revisiting and building on the original Lambda persistence technique.| frichetten.com