Field guide to abusing misconfigured pods, pivoting through bastions, breaking RBAC, and mapping segmentation gaps across AWS, GCP, and Oracle Kubernetes engines.
Plaidnox Research Desk
Plaidnox Blog
Deep dives, whitepapers, vulnerabilities, and tooling for defenders and breakers.
Cloud Security
1 entriesDevSecOps
2 entriesHow red teams chain Jenkins controller flaws, agent misconfigurations, and credential sprawl into full infrastructure compromise—and the controls that stop them.
Deep dive into the most common GitLab self-hosted misconfigurations, proofs of concept, and hardening steps to keep runners, tokens, and artifacts locked down.
Mobile Security
1 entriesFrom static triage to on-device exploitation: wiring MobSF, adb, and Drozer to audit APKs end-to-end with minimal manual effort.
Web Security
1 entriesDeep dive into cache hierarchies, web cache deception primitives, CDN/proxy bypass tricks, and the telemetry required to defend modern edge stacks.
Whitepaper
1 entriesA PlaidNox white paper on the risks of unmanaged external attack surfaces, the operational use cases for ASM, and how the VETA platform keeps pace with live infrastructure change.