BadBadger InfoSec
Menu
  • Home
  • About
  • Blog
Menu

Author: Dave Brock

ashes, volcano, eruption, volcanic eruption, disaster, natural disaster, natural phenomenon, smog, landscape, smoke, explosion, catastrophe, nature, volcano, volcano, volcano, volcano, volcano, disaster, smoke, smoke, explosion, explosion

Stopping an AWS Attack in Real Time – Walking through an Incident

Posted on December 15, 2024February 25, 2025 by Dave Brock

It started with a simple alert that would be easily overlooked—a sudden, unexpected spike in API activity from an IAM role that should have been dormant. No alarms were blaring (yet), and no critical systems had failed, but something felt… off. This is where instincts kick in. This is how a routine security review turned…

Read more

Writing Secure IAM Policies to Prevent Shadowing and Conflicts

Posted on July 24, 2024February 24, 2025 by Dave Brock

In our last post, we discussed detecting IAM policy shadowing using AWS-native tools. But detection alone isn’t enough—we must prevent these conflicts before they happen. A well-structured IAM policy follows least privilege principles, avoiding unintended permission escalations. In this post, we’ll cover best practices for writing secure IAM policies, including how to structure them correctly,…

Read more
Close-up of stacked binders filled with documents for office or educational use.

How to Detect IAM Policy Shadowing in AWS Using Native Tools

Posted on April 16, 2024February 24, 2025 by Dave Brock

In December 2022, security researchers at Sysdig uncovered real-world cases of privilege escalation via IAM misconfiguration. An attacker exploited an overlooked permission in an AWS environment, allowing them to modify IAM policies. By leveraging the ability to create new policy versions, they granted themselves full administrative access—bypassing intended security controls. This type of shadow IAM…

Read more

What Lurks in the Shadows of IAM? The Hidden Risk of Shadow Permissions

Posted on March 29, 2024February 24, 2025 by Dave Brock

IAM policies are like layered security badges—one might deny you entry, but you’re in if another gives you an all-access pass. This is AWS IAM Policy Shadowing. If you’re managing AWS IAM policies, you probably feel pretty confident about your security controls. But what if I told you there’s a hidden risk that could be…

Read more
sky background, sand, ocean-1077084.jpg

Becoming a Clear Communicator

Posted on November 2, 2023 by Dave Brock

I am an engineer by nature. I am technical down to my soul. My heart is not a fleshy pump but a contraption of gears and levers. My curiosity and need to understand the inner workings of all systems (and then how they can be broken), is the engine of how I work. It’s important…

Read more

A High-level Look at Threat Hunting with Wireshark and Packet Captures

Posted on June 3, 2023October 9, 2023 by Dave Brock

Packets or it didn’t happen! Packet captures are king.

Read more
artificial intelligence, ai, robot-2228610.jpg

Unlocking the Power of Open Source Intelligence (OSINT)

Posted on March 15, 2023October 9, 2023 by Dave Brock

The technique of Open Source Intelligence is a powerful tool that is being used for good and evil all the time.

Read more
mountain climbing, 5 dragon peak, the chubu sangaku national park-2124113.jpg

My InfoSec Adventure – Using Failure as a Sherpa

Posted on February 13, 2023November 1, 2023 by Dave Brock

The journey we are on is personal and failure can act as sherpas, leading us to where we want to go.

Read more

Recent Posts

  • Stopping an AWS Attack in Real Time – Walking through an Incident
  • Writing Secure IAM Policies to Prevent Shadowing and Conflicts
  • How to Detect IAM Policy Shadowing in AWS Using Native Tools
  • What Lurks in the Shadows of IAM? The Hidden Risk of Shadow Permissions
  • Becoming a Clear Communicator

Archives

  • December 2024
  • July 2024
  • April 2024
  • March 2024
  • November 2023
  • June 2023
  • March 2023
  • February 2023

Categories

  • InfoSec Career
  • Leadership
  • OSINT
  • Techniques
  • Tools
© 2025 BadBadger InfoSec | Powered by Minimalist Blog WordPress Theme