Overview of Azure Storage

Blob storage Binary Large Object (Blob) storage is a way of storing large files. There are 3 types of Blobs in Azure: Blob Blocks Divided into blocks of up to 100MB in size. Blobs of up to 4.75TB can be stored as blob blocks in Azure. Using multiple blocks to represent the blob allows for more efficient handling of large blobs. Usually, the complexity of managing individual blocks is handled for you so you can simply deal with the entire blob rather than individual blocks....

December 2, 2020 · 6 min · Bee

Azure Pricing & Support

In order to use Azure, we need an Azure subscription. Azure Subscriptions are linked to accounts that created the subscription. There are 3 main types of subscriptions: Free Unlimited access with £200 credit as as trial. Pay as you go Pay for the services and resources that we use on a monthly basis. Member Benefits Like MDN subscribers. Substantial discounts over pay as you go subscription. The person who creates the Azure subscription becomes the global administrator for that subscription....

December 2, 2020 · 2 min · Bee

Peer 2 Peer Networks

https://tryhackme.com/room/bruteit Preface If you’re reading this, like me, you must strangely like the idea of effectively designing peer to peer networks. Almost no real world usage (unless you work in this industry), but nevertheless the design is so interesting! Peer to peer networks effectively are close approximations of how humans interact. Much like how object orientated tried to represent how humans think, I believe peer to peer networks are how humans communicate....

December 2, 2020 · 65 min · Bee

Can Artificial Intelligence ever replace penetration testers?

Machine Learning Supervised Learning Unsupervised Learning Reinforcement Learning AlphaGo Learning from the greats Teaching itself Creativity Applications in InfoSec 1. Learning from others 2. Learning from itself Blue Team Humans vs AI Conclusion In this blog post we’ll explore if machines can fully replace pe Something to note is that predicting the future is hard and this is all entirely my opinion....

December 1, 2020 · 10 min · Bee

Learn Functional Python in 10 Minutes

In this short 10 minute article, you’ll learn what the functional paradigm is in Python. You’ll also learn about list comprehensions. 📌 Functional Paradigm In an imperative paradigm, we do things by giving the computer a sequence of tasks and then it executes them. While executing them, it can change states. For example, let’s say we set A = 5, then we change the value of A. We have variables in the sense that the value inside the variable varies....

November 30, 2020 · 14 min · Bee

Creating your own VPN with PiHole & UnBound on AWS

Introduction In this blog post we will: Create our own VPN on AWS Add PiHole to iit Use Unbound as our DNS resolver Access the VPN using Wireguard Not go bankrupt doing it! Step 1 Create an AWS lightsail instance on Amazon. We use Lightsail instead of EC2 because EC costs £0.12 / GB on outbound transfers. That means for 1 TB / month it’ll cost £120. Lightsail costs £3....

November 29, 2020 · 3 min · Bee

How I Hacked Your Pi-Hole

There are 5308 publically available Pi-Holes according to Shodan.io. This article will demonstrate how bad of an idea this is. If you’ve spent any time over at r/pihole, you’ll know they always talk about not having publically available Pi-Holes. But, why? What’s the harm? Out of the 5308 Pi-Holes publically available, I found 100 of them are vulnerable. Vulnerable means: You can access /admin/index.php?login. This is because not all Pi-Holes listed by Shodan work in the way we expect them to....

November 29, 2020 · 8 min · Bee

Introduction to IAM with AWS

Identity & Access Management Identities are required to authenticate to AWS accounts. Username = identity Password = verification Access management relates to what an identity can access once its been authenticated. The AWS IAM service is used to centrally manage and control security permissions. Users: These are objects within IAM identifying different users. Groups: These are objects that contain multiple users. Roles: These are objects that different identities can adopt to assume a new set of permissions....

November 29, 2020 · 3 min · Bee

Algorithmic Design Paradigms

Greedy Algorithms Greedy algorithms aim to make the optimal choice at that given moment. Each step it chooses the optimal choice, without knowing the future. It attempts to find the globally optimal way to solve the entire problem using this method. Why Are Greedy Algorithms Called Greedy? Algorithms are called greedy when they utilise the greedy property. The greedy property is: At that exact moment in time, what is the optimal choice to make?...

November 1, 2020 · 52 min · Bee

Favourite Books

How to Win Friends and Influence People If you talk to other humans, if you interact with humans, you must read this book. No exceptions. All my life, people told me that making friends and influencing people is an artform - something you can’t learn. This book showed me the hidden rules required to win friends. Since reading this book, every aspect of my friendships / relationships have gone up tenfold....

November 1, 2020 · 7 min · Bee