<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Manikanta Suru</title>
    <description>The latest articles on DEV Community by Manikanta Suru (@manikanta2023).</description>
    <link>https://dev.to/manikanta2023</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1022107%2F8cc36d29-b03d-4e88-b300-339936152ba8.png</url>
      <title>DEV Community: Manikanta Suru</title>
      <link>https://dev.to/manikanta2023</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/manikanta2023"/>
    <language>en</language>
    <item>
      <title>🚀 Run macOS on AWS EC2 in Under 10 Minutes! 🚀</title>
      <dc:creator>Manikanta Suru</dc:creator>
      <pubDate>Fri, 07 Mar 2025 03:53:48 +0000</pubDate>
      <link>https://dev.to/manikanta2023/run-macos-on-aws-ec2-in-under-10-minutes-13gl</link>
      <guid>https://dev.to/manikanta2023/run-macos-on-aws-ec2-in-under-10-minutes-13gl</guid>
      <description>&lt;p&gt;Are you a developer looking to build, test, or run macOS applications in the cloud? 🖥️ With Amazon Web Services (AWS), you can now run macOS on EC2 instances using Dedicated Hosts! In this guide, I’ll walk you through the step-by-step process of setting up a macOS EC2 instance in less than 10 minutes. Let’s dive in!&lt;br&gt;
**&lt;br&gt;
Why Use macOS on AWS? 🤔**&lt;/p&gt;

&lt;p&gt;✅ Build and Test macOS Apps: Perfect for developers building macOS or iOS applications.&lt;br&gt;
✅ Scalability: Quickly spin up macOS instances as needed.&lt;br&gt;
✅ Cost-Effective: Pay only for what you use.&lt;/p&gt;

&lt;p&gt;Prerequisites 📋&lt;br&gt;
Before you begin, ensure you have the following:&lt;/p&gt;

&lt;p&gt;An AWS account with sufficient permissions to create EC2 instances and Dedicated Hosts.&lt;/p&gt;

&lt;p&gt;Familiarity with the AWS Management Console.&lt;/p&gt;

&lt;p&gt;(Optional) AWS CLI installed and configured if you prefer command-line operations.&lt;/p&gt;

&lt;p&gt;Step 1: Allocate a Dedicated Host 🖥️&lt;br&gt;
A Dedicated Host is required to run macOS instances on AWS. Follow these steps to allocate one:&lt;/p&gt;

&lt;p&gt;Log in to the AWS Management Console.&lt;/p&gt;

&lt;p&gt;Navigate to the EC2 Dashboard.&lt;/p&gt;

&lt;p&gt;In the left-hand menu, under Instances, select Dedicated Hosts.&lt;/p&gt;

&lt;p&gt;Click on Allocate Dedicated Host.&lt;/p&gt;

&lt;p&gt;Configure the Dedicated Host:&lt;/p&gt;

&lt;p&gt;Instance Family: Select mac1.&lt;/p&gt;

&lt;p&gt;Instance Type: Choose mac1.metal.&lt;/p&gt;

&lt;p&gt;Availability Zone: Select the desired zone (e.g., us-east-1a).&lt;/p&gt;

&lt;p&gt;Quantity: Set to 1.&lt;/p&gt;

&lt;p&gt;Click Allocate.&lt;/p&gt;

&lt;p&gt;Wait a few seconds for the Dedicated Host to be allocated. You’ll see it listed under Dedicated Hosts.&lt;/p&gt;

&lt;p&gt;Step 2: Launch a macOS EC2 Instance 🚀&lt;br&gt;
Now that you have a Dedicated Host, you can launch a macOS EC2 instance on it.&lt;/p&gt;

&lt;p&gt;In the EC2 Dashboard, click on Instances in the left-hand menu.&lt;/p&gt;

&lt;p&gt;Click Launch Instances.&lt;/p&gt;

&lt;p&gt;Step 1: Choose an Amazon Machine Image (AMI)&lt;br&gt;
Search for macOS in the AMI catalog.&lt;/p&gt;

&lt;p&gt;Select the latest macOS AMI (e.g., macOS Monterey or macOS Ventura).&lt;/p&gt;

&lt;p&gt;Step 2: Choose an Instance Type&lt;br&gt;
Select mac1.metal (the only instance type supported for macOS).&lt;/p&gt;

&lt;p&gt;Step 3: Configure Instance Details&lt;br&gt;
Under Tenancy, select Dedicated Host.&lt;/p&gt;

&lt;p&gt;In the Host field, select the Dedicated Host you allocated earlier.&lt;/p&gt;

&lt;p&gt;Configure other settings (e.g., VPC, subnet, IAM role) as needed.&lt;/p&gt;

&lt;p&gt;Step 4: Add Storage&lt;br&gt;
The default storage is usually sufficient (at least 60 GB is recommended for macOS).&lt;/p&gt;

&lt;p&gt;Step 5: Configure Security Group&lt;br&gt;
Assign a security group that allows SSH (port 22) and any other necessary ports (e.g., RDP for remote desktop access).&lt;/p&gt;

&lt;p&gt;Step 6: Review and Launch&lt;br&gt;
Review your settings and click Launch.&lt;/p&gt;

&lt;p&gt;Select an existing key pair or create a new one for SSH access.&lt;/p&gt;

&lt;p&gt;Step 3: Connect to Your macOS Instance 🔗&lt;br&gt;
Once the instance is running, you can connect to it using SSH.&lt;/p&gt;

&lt;p&gt;In the EC2 Dashboard, select your instance and note its Public IP or Public DNS.&lt;/p&gt;

&lt;p&gt;Use SSH to connect to your instance:&lt;br&gt;
ssh -i /path/to/your-key.pem ec2-user@&lt;br&gt;
The default username for macOS instances is ec2-user.&lt;/p&gt;

&lt;p&gt;Step 4: Verify the macOS Environment ✅&lt;br&gt;
After connecting to your instance, verify that the macOS environment is set up correctly.&lt;/p&gt;

&lt;p&gt;Check the macOS version:&lt;br&gt;
sw_vers&lt;br&gt;
You should see output similar to:&lt;br&gt;
ProductName: macOS&lt;br&gt;
ProductVersion: 12.0.1&lt;br&gt;
BuildVersion: 21A559&lt;br&gt;
(Optional) Install additional tools or dependencies as needed.&lt;/p&gt;

&lt;p&gt;Step 5: Configure Inbound Rules and ARD Settings 🔒&lt;br&gt;
Inbound Rules Configuration&lt;br&gt;
Ensure your security group allows the following inbound rules:&lt;/p&gt;

&lt;p&gt;SSH on TCP port 22 (for SSH access).&lt;/p&gt;

&lt;p&gt;Custom TCP on port 5900 (for VNC).&lt;/p&gt;

&lt;p&gt;Custom TCP on port 3389 (for RDP).&lt;/p&gt;

&lt;p&gt;Configure Apple Remote Desktop (ARD) Settings&lt;br&gt;
Run the following command to configure ARD:&lt;/p&gt;

&lt;p&gt;sudo /System/Library/CoreServices/RemoteManagement/ARDAgent.app/Contents/Resources/kickstart -activate -configure -access -on -clientopts -setvnclegacy -vnclegacy yes -clientopts -setvncpw -vncpw password1 -restart -agent -privs -all&lt;br&gt;
Change the password for the user ec2-user:&lt;/p&gt;

&lt;p&gt;sudo passwd ec2-user&lt;br&gt;
Make sure to replace password1 with the actual password you want to set for the VNC connection.&lt;/p&gt;

&lt;p&gt;Step 6: Clean Up (Optional) 🧹&lt;br&gt;
To avoid unnecessary charges, release the Dedicated Host and terminate the instance when you’re done.&lt;/p&gt;

&lt;p&gt;Terminate the Instance:&lt;/p&gt;

&lt;p&gt;In the EC2 Dashboard, select your instance and click Instance State &amp;gt; Terminate Instance.&lt;/p&gt;

&lt;p&gt;Release the Dedicated Host:&lt;/p&gt;

&lt;p&gt;Navigate to Dedicated Hosts, select the host, and click Actions &amp;gt; Release Host.&lt;/p&gt;

&lt;p&gt;Final Thoughts 💡&lt;br&gt;
Setting up a macOS EC2 instance on AWS using Dedicated Hosts is quick and straightforward. With this guide, you can get started in less than 10 minutes. Remember to clean up your resources to avoid unnecessary charges.&lt;/p&gt;

&lt;p&gt;If you found this guide helpful, feel free to share it with others. Happy coding! 🚀&lt;/p&gt;

&lt;p&gt;Reference Screenshots 📸&lt;br&gt;
Windows VNC Viewer Download URL: RealVNC Viewer&lt;/p&gt;

&lt;p&gt;Image Credits: iExplorer&lt;/p&gt;

&lt;h1&gt;
  
  
  AWS #macOS #EC2 #CloudComputing #DevOps #TechGuide #AppleDeveloper #CloudInfrastructure #AWSGuide
&lt;/h1&gt;

</description>
    </item>
    <item>
      <title>Demystifying Ransomware Attacks</title>
      <dc:creator>Manikanta Suru</dc:creator>
      <pubDate>Tue, 21 Nov 2023 02:49:33 +0000</pubDate>
      <link>https://dev.to/manikanta2023/demystifying-ransomware-attacks-35ch</link>
      <guid>https://dev.to/manikanta2023/demystifying-ransomware-attacks-35ch</guid>
      <description>&lt;p&gt;&lt;strong&gt;Unmasking the Role of RDP and Strengthening Your Defenses &lt;/strong&gt;🛡️&lt;br&gt;
&lt;strong&gt;Intro:&lt;/strong&gt; In the alarming realm of cybersecurity, Ransomware attacks have taken an insidious turn, with a whopping 95% involving the exploitation of Remote Desktop Protocol (RDP) in 2023 (source: Sophos). Unsurprisingly, RDP's prevalence in every Windows system makes it a prime target for attackers seeking a gateway into your digital domain. Let's unravel how RDP is wielded as a weapon in launching ransomware attacks and explore practical strategies to fortify your defenses.&lt;br&gt;
Attack Flow:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt; 1. Infiltration Begins:&lt;/strong&gt; Scanning for Vulnerabilities 🎯 Attackers kick off their malicious endeavors by scanning IP ranges for open RDP ports (typically 3389) that are exposed to the internet.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. Breaching the Gates:&lt;/strong&gt; Unauthorized RDP Access 🕵️ Once a vulnerable target is identified, attackers initiate attempts to breach the system via RDP. This sets the stage for the next critical steps in their nefarious playbook.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3. The Brute Force Gambit&lt;/strong&gt; 🔐 The attacker's arsenal includes brute force attacks on local user accounts, often exploiting commonly used usernames like "admin" or "administrator" with easily guessable passwords. For instance, attempts like Username: IP Address\admin &amp;amp; Password: Password@123 are commonplace.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;4. Diverse Credential Harvesting 🌐&lt;/strong&gt; In addition to brute force, attackers deploy various tactics to acquire login credentials, ranging from dark web purchases to leveraging stolen data and phishing attacks.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;5. Seizing Control:&lt;/strong&gt;Compromising the System 💻🔓 With successful infiltration, the attacker gains control of the system without physical presence, paving the way for the ultimate act in their sinister plot.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;6. Unleashing Ransomware:&lt;/strong&gt; The Network Propagation ⚔️ The compromised system becomes ground zero for deploying ransomware, initiating an automated scan of other systems to propagate the malicious payload across the network.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Defensive Measures: &lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1. Fortify Your Perimeter: RDP Management 🚫&lt;/strong&gt;&lt;br&gt;
If RDP isn't imperative, turn it OFF. When necessary, shield it behind a VPN with robust security protocols to prevent direct exposure to the internet.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. Restrict Access: Administrator Groups 🛑&lt;/strong&gt;&lt;br&gt;
Mitigate risk by removing the local Administrators group from the list of entities allowed to log in through RDP, preventing attackers from exploiting local admin accounts.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3. Strengthen Passwords: Avoid Guessable Defaults 🔐&lt;/strong&gt;&lt;br&gt;
Eliminate the ticking time bomb of guessable passwords for local accounts, especially during device setup. Manage local admin accounts with Windows LAPS (Local Administrator Password Solution) for enhanced security.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;4. Vigilant Monitoring: Identify Threats Early 🕵️‍♂️&lt;/strong&gt;&lt;br&gt;
Keep a watchful eye on successive failed login attempts, utilizing Windows Event ID 4625 for early detection and swift response.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Conclusion:&lt;/strong&gt; In the battle against ransomware, understanding the pivotal role of RDP is paramount. Implement these proactive measures to fortify your defences and thwart attackers at the gates. Stay secure, stay vigilant! 🌐🔒&lt;/p&gt;

&lt;p&gt;P.S. If you found this insightful, join me at Manikanta Suru for more cybersecurity insights in the future! 🚀&lt;/p&gt;

</description>
      <category>security</category>
      <category>development</category>
      <category>learning</category>
    </item>
    <item>
      <title>"𝐗" (𝐅𝐨𝐫𝐦𝐞𝐫𝐥𝐲 𝐓𝐰𝐢𝐭𝐭𝐞𝐫) 𝐬𝐚𝐯𝐞𝐬 𝐂𝐨𝐬𝐭𝐬 𝐛𝐲 𝟔𝟎% 𝐀𝐟𝐭𝐞𝐫 𝐋𝐞𝐚𝐯𝐢𝐧𝐠 𝐭𝐡𝐞 𝐂𝐥𝐨𝐮𝐝 ☁️💰😱</title>
      <dc:creator>Manikanta Suru</dc:creator>
      <pubDate>Mon, 06 Nov 2023 04:25:13 +0000</pubDate>
      <link>https://dev.to/manikanta2023/--33o</link>
      <guid>https://dev.to/manikanta2023/--33o</guid>
      <description>&lt;p&gt;Cloud is known for cost saving rather than setting up your own infrastructure but…&lt;br&gt;
In a Recent Blog Twitter claims to save 𝟔𝟎% 𝐚𝐟𝐭𝐞𝐫 𝐥𝐞𝐚𝐯𝐢𝐧𝐠 𝐂𝐥𝐨𝐮𝐝 😮&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;💲 Twitter, previously spent $100 million annually with AWS.&lt;/li&gt;
&lt;li&gt;💥Exiting the cloud is set to save Twitter $60 million per year. 🎉&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;𝐇𝐨𝐰 𝐓𝐡𝐞𝐲 𝐃𝐢𝐝 𝐈𝐭:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;💼 "X" had a five-and-a-half-year AWS deal valued at $510 million, or approximately $𝟕.𝟕𝟑 𝐦𝐢𝐥𝐥𝐢𝐨𝐧 𝐩𝐞𝐫 𝐦𝐨𝐧𝐭𝐡. 💸&lt;/li&gt;
&lt;li&gt;🔄 They optimized costs by turning off extra server capacity during low-traffic times.&lt;/li&gt;
&lt;li&gt;🤝 Contract renegotiations with major cloud providers like AWS, Google Cloud, and Oracle were part of their strategy.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Takeaway:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;💰 Businesses should always explore cost optimization opportunities.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;🤔 What do you think of "X's" cost-saving approach? What are other things associated in the cost? Is this the right move? Share your thoughts below! #cloudsavings&lt;/p&gt;

&lt;p&gt;Source links in comment section 👇👇&lt;/p&gt;

&lt;p&gt;Repost, it helps ☺️&lt;/p&gt;

&lt;p&gt;Follow &lt;a href="https://linktr.ee/manitechy"&gt;https://linktr.ee/manitechy&lt;/a&gt; for more Cloud &amp;amp; DevOps content 🤝&lt;/p&gt;

</description>
      <category>cloud</category>
      <category>cost</category>
      <category>productivity</category>
      <category>aws</category>
    </item>
    <item>
      <title>𝐃𝐞𝐯𝐒𝐞𝐜𝐎𝐩𝐬 𝐢𝐧 𝐀𝐳𝐮𝐫𝐞</title>
      <dc:creator>Manikanta Suru</dc:creator>
      <pubDate>Mon, 06 Nov 2023 04:04:59 +0000</pubDate>
      <link>https://dev.to/manikanta2023/-mhh</link>
      <guid>https://dev.to/manikanta2023/-mhh</guid>
      <description>&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--mDWTTNGb--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/hfpqmu3u1lr5jxq0qq2n.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--mDWTTNGb--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/hfpqmu3u1lr5jxq0qq2n.png" alt="Image description" width="600" height="354"&gt;&lt;/a&gt;**&lt;br&gt;
🔐𝐀𝐳𝐮𝐫𝐞 𝐀𝐃 &amp;amp; 𝐆𝐢𝐭𝐇𝐮𝐛 𝐈𝐧𝐭𝐞𝐠𝐫𝐚𝐭𝐢𝐨𝐧:&lt;br&gt;
Azure Active Directory (Azure AD) serves as the identity provider for GitHub, ensuring secure user authentication and access control. Multi-factor Authentication (MFA) adds an additional layer of security by requiring users to verify their identity through multiple methods, such as a password and a mobile app, before accessing resources.&lt;/p&gt;

&lt;p&gt;🛠️ 𝐃𝐞𝐯𝐞𝐥𝐨𝐩𝐦𝐞𝐧𝐭 𝐖𝐨𝐫𝐤𝐟𝐥𝐨𝐰:&lt;br&gt;
 Developers working on GitHub Enterprise streamline their work by connecting it with Azure Boards. This integration allows them to link their code commits to work items and bugs, making it easier to track progress and manage development tasks efficiently.&lt;/p&gt;

&lt;p&gt;🔒 𝐆𝐢𝐭𝐇𝐮𝐛 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐌𝐞𝐚𝐬𝐮𝐫𝐞𝐬: &lt;br&gt;
 &lt;br&gt;
GitHub Advanced Security and GitHub Open Source Security provide automated security and dependency scanning for code repositories. These tools help identify vulnerabilities and potential security risks, ensuring that code remains robust and safe.&lt;/p&gt;

&lt;p&gt;🔁 𝐂𝐈/𝐂𝐃 𝐀𝐮𝐭𝐨𝐦𝐚𝐭𝐢𝐨𝐧:&lt;br&gt;
 Continuous Integration (CI) and Continuous Deployment (CD) are automated through Azure Pipelines. Pull requests trigger CI builds and automated testing, guaranteeing code quality and reliability before deployment.&lt;/p&gt;

&lt;p&gt;🐳 𝐂𝐨𝐧𝐭𝐚𝐢𝐧𝐞𝐫𝐢𝐳𝐚𝐭𝐢𝐨𝐧 &amp;amp; 𝐃𝐞𝐩𝐥𝐨𝐲𝐦𝐞𝐧𝐭: &lt;/p&gt;

&lt;p&gt;Azure Pipelines generate Docker container images that are stored in the Azure Container Registry. These container images are used at release time by Azure Kubernetes Service (AKS), simplifying the &lt;br&gt;
deployment process and enhancing scalability.&lt;/p&gt;

&lt;p&gt;🔍 𝐈𝐦𝐚𝐠𝐞 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐒𝐜𝐚𝐧𝐬: &lt;/p&gt;

&lt;p&gt;Microsoft Defender for Cloud conducts security scans on container images stored in Azure Container Registry. It identifies Azure-native vulnerabilities and provides security recommendations, ensuring the images are safe for deployment.&lt;/p&gt;

&lt;p&gt;☁️ 𝐈𝐧𝐟𝐫𝐚𝐬𝐭𝐫𝐮𝐜𝐭𝐮𝐫𝐞 𝐚𝐬 𝐂𝐨𝐝𝐞: &lt;br&gt;
Azure Pipelines seamlessly manage cloud infrastructure resources using Terraform. This infrastructure-as-code approach automates the provisioning of resources like Azure Kubernetes Service, Azure Application Gateway, and Azure Cosmos DB, enhancing scalability and reliability.&lt;/p&gt;

&lt;p&gt;🔒 𝐄𝐧𝐟𝐨𝐫𝐜𝐢𝐧𝐠 𝐏𝐨𝐥𝐢𝐜𝐢𝐞𝐬: &lt;br&gt;
Azure Policy can be applied to Azure Pipelines to enforce post-deployment gateways and directly to the Azure Kubernetes Service (AKS) engine for policy enforcement. This ensures that deployments adhere to organizational and security policies.&lt;/p&gt;

&lt;p&gt;🔑 𝐒𝐞𝐜𝐮𝐫𝐞 𝐃𝐚𝐭𝐚 𝐈𝐧𝐣𝐞𝐜𝐭𝐢𝐨𝐧:&lt;br&gt;
 Azure Key Vault is used to inject secrets and credentials into applications at runtime securely. It abstracts sensitive information from developers, enhancing security and compliance.&lt;/p&gt;

&lt;p&gt;👤 𝐔𝐬𝐞𝐫 𝐀𝐮𝐭𝐡𝐞𝐧𝐭𝐢𝐜𝐚𝐭𝐢𝐨𝐧: &lt;/p&gt;

&lt;p&gt;End users can authenticate with Azure AD B2C (Business to Consumer), which ensures secure and user-friendly authentication. Users are required to use MFA for an extra layer of security. Additionally, an Application Gateway provides load balancing and security for core services.&lt;br&gt;
 👁️ 𝐌𝐨𝐧𝐢𝐭𝐨𝐫𝐢𝐧𝐠 &amp;amp; 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲:&lt;/p&gt;

&lt;p&gt; Azure Monitor extends monitoring capabilities to release pipelines, enabling organizations to gate or rollback releases based on monitoring data. It also ingests security logs and can alert on suspicious activities, enhancing overall security.&lt;/p&gt;

&lt;p&gt;🛡️ 𝐀𝐜𝐭𝐢𝐯𝐞 𝐓𝐡𝐫𝐞𝐚𝐭 𝐌𝐨𝐧𝐢𝐭𝐨𝐫𝐢𝐧𝐠: &lt;/p&gt;

&lt;p&gt;Microsoft Defender for Cloud monitors the Azure Kubernetes Service (AKS) at the Node level, safeguarding against VM threats and internal security risks. This ensures that the infrastructure remains resilient to potential threats.&lt;/p&gt;

&lt;p&gt;𝐒𝐨𝐮𝐫𝐜𝐞: &lt;a href="https://learn.microsoft.com/en-us/azure/architecture/guide/devsecops/devsecops-on-aks?utm_content=buffer5b38c&amp;amp;utm_medium=social&amp;amp;utm_source=linkedin.com&amp;amp;utm_campaign=buffer"&gt;https://learn.microsoft.com/en-us/azure/architecture/guide/devsecops/devsecops-on-aks?utm_content=buffer5b38c&amp;amp;utm_medium=social&amp;amp;utm_source=linkedin.com&amp;amp;utm_campaign=buffer&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Credit: This article is maintained by Microsoft. It was originally written by the following contributors - Adnan Khan&lt;/p&gt;

&lt;p&gt;𝐃𝐢𝐬𝐜𝐥𝐚𝐢𝐦𝐞𝐫 - This post has only been shared for an educational and knowledge-sharing purpose related to Technologies. Information was obtained from the source above and credited to the author.&lt;/p&gt;

&lt;h1&gt;
  
  
  manitechy #cloudnloud #AzureDevelopment #GitHubIntegration #AzureSecurity #CI/CD #Containerization #AzurePipelines #DevOps #AzureAD #MFA #AzureKubernetesService #SecurityScanning #InfrastructureAsCode #AzurePolicy #AzureKeyVault #Authentication #Monitoring #MicrosoftDefender #DevSecOps #AzureContainerRegistry #Terraform
&lt;/h1&gt;

</description>
      <category>security</category>
      <category>devops</category>
      <category>cloudcomputing</category>
      <category>beginners</category>
    </item>
    <item>
      <title>Exploring 100 Web Vulnerabilities:</title>
      <dc:creator>Manikanta Suru</dc:creator>
      <pubDate>Thu, 02 Nov 2023 07:35:59 +0000</pubDate>
      <link>https://dev.to/manikanta2023/exploring-100-web-vulnerabilities-17p3</link>
      <guid>https://dev.to/manikanta2023/exploring-100-web-vulnerabilities-17p3</guid>
      <description>&lt;p&gt;🔐 Cybersecurity has never been more critical in an age where the digital landscape is the backbone of our daily lives.&lt;/p&gt;

&lt;p&gt;💻 With its sprawling network of interconnected sites and applications, the web is a breeding ground for vulnerabilities that malicious actors can exploit.&lt;/p&gt;

&lt;p&gt;🌐 In this blog post, we dive deep into the world of web vulnerabilities, presenting a comprehensive list of 100, thoughtfully categorized into various types.&lt;/p&gt;

&lt;p&gt;🛡️ Whether you’re a cybersecurity enthusiast, a web developer, or just someone curious about online security, this resource will shed light on the diverse threats lurking on the web and help you better understand how to protect yourself and your digital assets.&lt;/p&gt;

&lt;h1&gt;
  
  
  100-web-vulnerabilities-names- categorized into various types
&lt;/h1&gt;

&lt;h1&gt;
  
  
  Injection Vulnerabilities
&lt;/h1&gt;

&lt;ol&gt;
&lt;li&gt;SQL Injection (SQLi)&lt;/li&gt;
&lt;li&gt;Cross-Site Scripting (XSS)&lt;/li&gt;
&lt;li&gt;Cross-Site Request Forgery (CSRF)&lt;/li&gt;
&lt;li&gt;Remote Code Execution (RCE)&lt;/li&gt;
&lt;li&gt;Command Injection&lt;/li&gt;
&lt;li&gt;XML Injection&lt;/li&gt;
&lt;li&gt;LDAP Injection&lt;/li&gt;
&lt;li&gt;XPath Injection&lt;/li&gt;
&lt;li&gt;HTML Injection&lt;/li&gt;
&lt;li&gt;Server-Side Includes (SSI) Injection&lt;/li&gt;
&lt;li&gt;OS Command Injection&lt;/li&gt;
&lt;li&gt;Blind SQL Injection&lt;/li&gt;
&lt;li&gt;Server-Side Template Injection (SSTI)
# Broken Authentication and Session Management:&lt;/li&gt;
&lt;li&gt;Session Fixation&lt;/li&gt;
&lt;li&gt;Brute Force Attack&lt;/li&gt;
&lt;li&gt;Session Hijacking&lt;/li&gt;
&lt;li&gt;Password Cracking&lt;/li&gt;
&lt;li&gt;Weak Password Storage&lt;/li&gt;
&lt;li&gt;Insecure Authentication&lt;/li&gt;
&lt;li&gt;Cookie Theft&lt;/li&gt;
&lt;li&gt;Credential Reuse
# Sensitive Data Exposure:&lt;/li&gt;
&lt;li&gt;Inadequate Encryption&lt;/li&gt;
&lt;li&gt;Insecure Direct Object References (IDOR)&lt;/li&gt;
&lt;li&gt;Data Leakage&lt;/li&gt;
&lt;li&gt;Unencrypted Data Storage&lt;/li&gt;
&lt;li&gt;Missing Security Headers&lt;/li&gt;
&lt;li&gt;Insecure File Handling
# Security Misconfiguration:&lt;/li&gt;
&lt;li&gt;Default Passwords&lt;/li&gt;
&lt;li&gt;Directory Listing&lt;/li&gt;
&lt;li&gt;Unprotected API Endpoints&lt;/li&gt;
&lt;li&gt;Open Ports and Services&lt;/li&gt;
&lt;li&gt;Improper Access Controls&lt;/li&gt;
&lt;li&gt;Information Disclosure&lt;/li&gt;
&lt;li&gt;Unpatched Software&lt;/li&gt;
&lt;li&gt;Misconfigured CORS&lt;/li&gt;
&lt;li&gt;HTTP Security Headers Misconfiguration
# XML-Related Vulnerabilities:&lt;/li&gt;
&lt;li&gt;XML External Entity (XXE) Injection&lt;/li&gt;
&lt;li&gt;XML Entity Expansion (XEE)&lt;/li&gt;
&lt;li&gt;XML Bomb
# Broken Access Control:&lt;/li&gt;
&lt;li&gt;Inadequate Authorization&lt;/li&gt;
&lt;li&gt;Privilege Escalation&lt;/li&gt;
&lt;li&gt;Insecure Direct Object References&lt;/li&gt;
&lt;li&gt;Forceful Browsing&lt;/li&gt;
&lt;li&gt;Missing Function-Level Access Control
# Insecure Deserialization:&lt;/li&gt;
&lt;li&gt;Remote Code Execution via Deserialization&lt;/li&gt;
&lt;li&gt;Data Tampering&lt;/li&gt;
&lt;li&gt;Object Injection
# API Security Issues:&lt;/li&gt;
&lt;li&gt;Insecure API Endpoints&lt;/li&gt;
&lt;li&gt;API Key Exposure&lt;/li&gt;
&lt;li&gt;Lack of Rate Limiting&lt;/li&gt;
&lt;li&gt;Inadequate Input Validation
# Insecure Communication:&lt;/li&gt;
&lt;li&gt;Man-in-the-Middle (MITM) Attack&lt;/li&gt;
&lt;li&gt;Insufficient Transport Layer Security&lt;/li&gt;
&lt;li&gt;Insecure SSL/TLS Configuration&lt;/li&gt;
&lt;li&gt;Insecure Communication Protocols
# Client-Side Vulnerabilities:&lt;/li&gt;
&lt;li&gt;DOM-based XSS&lt;/li&gt;
&lt;li&gt;Insecure Cross-Origin Communication&lt;/li&gt;
&lt;li&gt;Browser Cache Poisoning&lt;/li&gt;
&lt;li&gt;Clickjacking&lt;/li&gt;
&lt;li&gt;HTML5 Security Issues
# Denial of Service (DoS):&lt;/li&gt;
&lt;li&gt;Distributed Denial of Service (DDoS)&lt;/li&gt;
&lt;li&gt;Application Layer DoS&lt;/li&gt;
&lt;li&gt;Resource Exhaustion&lt;/li&gt;
&lt;li&gt;Slowloris Attack&lt;/li&gt;
&lt;li&gt;XML Denial of Service
# Other Web Vulnerabilities:&lt;/li&gt;
&lt;li&gt;Server-Side Request Forgery (SSRF)&lt;/li&gt;
&lt;li&gt;HTTP Parameter Pollution (HPP)&lt;/li&gt;
&lt;li&gt;Insecure Redirects and Forwards&lt;/li&gt;
&lt;li&gt;File Inclusion Vulnerabilities&lt;/li&gt;
&lt;li&gt;Security Header Bypass&lt;/li&gt;
&lt;li&gt;Clickjacking&lt;/li&gt;
&lt;li&gt;Inadequate Session Timeout&lt;/li&gt;
&lt;li&gt;Insufficient Logging and Monitoring&lt;/li&gt;
&lt;li&gt;Business Logic Vulnerabilities&lt;/li&gt;
&lt;li&gt;API Abuse
# Mobile Web Vulnerabilities:&lt;/li&gt;
&lt;li&gt;Insecure Data Storage on Mobile Devices&lt;/li&gt;
&lt;li&gt;Insecure Data Transmission on Mobile Devices&lt;/li&gt;
&lt;li&gt;Insecure Mobile API Endpoints&lt;/li&gt;
&lt;li&gt;Mobile App Reverse Engineering
# IoT Web Vulnerabilities:&lt;/li&gt;
&lt;li&gt;Insecure IoT Device Management&lt;/li&gt;
&lt;li&gt;Weak Authentication on IoT Devices&lt;/li&gt;
&lt;li&gt;IoT Device Vulnerabilities
# Web of Things (WoT) Vulnerabilities:&lt;/li&gt;
&lt;li&gt;Unauthorized Access to Smart Homes&lt;/li&gt;
&lt;li&gt;IoT Data Privacy Issues
# Authentication Bypass:&lt;/li&gt;
&lt;li&gt;Insecure "Remember Me" Functionality&lt;/li&gt;
&lt;li&gt;CAPTCHA Bypass
# Server-Side Request Forgery (SSRF):&lt;/li&gt;
&lt;li&gt;Blind SSRF&lt;/li&gt;
&lt;li&gt;Time-Based Blind SSRF
# Content Spoofing:&lt;/li&gt;
&lt;li&gt;MIME Sniffing&lt;/li&gt;
&lt;li&gt;X-Content-Type-Options Bypass&lt;/li&gt;
&lt;li&gt;Content Security Policy (CSP) Bypass
# Business Logic Flaws:&lt;/li&gt;
&lt;li&gt;Inconsistent Validation&lt;/li&gt;
&lt;li&gt;Race Conditions&lt;/li&gt;
&lt;li&gt;Order Processing Vulnerabilities&lt;/li&gt;
&lt;li&gt;Price Manipulation&lt;/li&gt;
&lt;li&gt;Account Enumeration&lt;/li&gt;
&lt;li&gt;User-Based Flaws
# Zero-Day Vulnerabilities:&lt;/li&gt;
&lt;li&gt;Unknown Vulnerabilities&lt;/li&gt;
&lt;li&gt;Unpatched Vulnerabilities&lt;/li&gt;
&lt;li&gt;Day-Zero Exploits&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;👉 info:- &lt;a href="https://github.com/manikanta-suru/100-web-vulnerabilities-names-#client-side-vulnerabilities"&gt;https://github.com/manikanta-suru/100-web-vulnerabilities-names-#client-side-vulnerabilities&lt;/a&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>cloudsecurity</category>
      <category>testing</category>
    </item>
    <item>
      <title>📱 iPhone Unavailable Lock Screen Fix (Forgot Passcode) — A Practical Hands-On Guide.</title>
      <dc:creator>Manikanta Suru</dc:creator>
      <pubDate>Thu, 02 Nov 2023 06:47:32 +0000</pubDate>
      <link>https://dev.to/manikanta2023/iphone-unavailable-lock-screen-fix-forgot-passcode-a-practical-hands-on-guide-2b4g</link>
      <guid>https://dev.to/manikanta2023/iphone-unavailable-lock-screen-fix-forgot-passcode-a-practical-hands-on-guide-2b4g</guid>
      <description>&lt;p&gt;👋 Hello, Connections!&lt;/p&gt;

&lt;p&gt;📈 Let’s embark on a journey of learning and growth together.&lt;/p&gt;

&lt;p&gt;📱 iPhone Unavailable Lock Screen Fix (Forgot Passcode) — A Practical Hands-On Guide.&lt;/p&gt;

&lt;p&gt;👉“First, download your iPhone’s latest firmware and 3uTools software. You can find the latest firmware for your iPhone model at and download 3uTools.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--lBzuq4sq--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/vjueuo9ojjae4l8cdseq.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--lBzuq4sq--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/vjueuo9ojjae4l8cdseq.png" alt="Image description" width="800" height="380"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--YKRwndwX--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/43qqi1sby7wpg35icq69.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--YKRwndwX--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/43qqi1sby7wpg35icq69.png" alt="Image description" width="750" height="383"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://ipsw.me/download/iPhone12,8/21A360"&gt;https://ipsw.me/download/iPhone12,8/21A360&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.3u.com/productsIos#installationBox"&gt;https://www.3u.com/productsIos#installationBox&lt;/a&gt;&lt;br&gt;
👉Install the 3uTool software/tool.&lt;br&gt;
👉turn off your iPhone and put on recovery mode and setups below&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--pSKCABHX--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/ou8rar51z91haca53mvf.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--pSKCABHX--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/ou8rar51z91haca53mvf.png" alt="Image description" width="640" height="355"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://support.apple.com/en-in/HT204306"&gt;https://support.apple.com/en-in/HT204306&lt;/a&gt;&lt;br&gt;
The corrected sentence is:&lt;/p&gt;

&lt;p&gt;👉“Once you connect the iPhone to your laptop, check 3uTool; it will display the information.”&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--ThRFzW0S--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/catc7aci17mn3ygmrh8x.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--ThRFzW0S--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/catc7aci17mn3ygmrh8x.png" alt="Image description" width="750" height="403"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;👉Before downloading the latest iPhone firmware, import it into 3uTool.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--0cnNBQ8t--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/y0vj50xbcspnu7s9alb0.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--0cnNBQ8t--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/y0vj50xbcspnu7s9alb0.png" alt="Image description" width="640" height="165"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;👉“Next, click on Quick Flash mode and wait for the process to complete.”&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--w3ws5ebw--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/pwtn69drrjguh9pjqfs2.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--w3ws5ebw--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/pwtn69drrjguh9pjqfs2.png" alt="Image description" width="750" height="400"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--if-mdTfw--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/b5k44u01an98mtt6ee5h.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--if-mdTfw--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/b5k44u01an98mtt6ee5h.png" alt="Image description" width="366" height="651"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--oQuNNC28--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/u0x4qtw0zf9a7eomuhbf.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--oQuNNC28--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/u0x4qtw0zf9a7eomuhbf.png" alt="Image description" width="640" height="1139"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--FKE51zJN--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/1811vt4vt5x16tpd03ds.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--FKE51zJN--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/1811vt4vt5x16tpd03ds.png" alt="Image description" width="640" height="360"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--2ujoiLWO--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/j3zdo3kwlq95rkfzybxp.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--2ujoiLWO--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/j3zdo3kwlq95rkfzybxp.png" alt="Image description" width="640" height="1139"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--or5cHIq3--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/ejq8kb17hk65x3ar5hhe.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--or5cHIq3--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/ejq8kb17hk65x3ar5hhe.png" alt="Image description" width="640" height="1139"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;“That’s all, but please remember your old Apple ID and password to log in to the device.”&lt;/p&gt;

</description>
      <category>lock</category>
      <category>security</category>
      <category>tutorial</category>
      <category>opensource</category>
    </item>
    <item>
      <title>🍯 Honeypots: Brief Introduction🍯</title>
      <dc:creator>Manikanta Suru</dc:creator>
      <pubDate>Thu, 02 Nov 2023 06:42:25 +0000</pubDate>
      <link>https://dev.to/manikanta2023/honeypots-brief-introduction-n1i</link>
      <guid>https://dev.to/manikanta2023/honeypots-brief-introduction-n1i</guid>
      <description>&lt;p&gt;🍯 &lt;strong&gt;Honeypots: Brief Introduction&lt;/strong&gt;🍯&lt;/p&gt;

&lt;p&gt;Honeypots are a type of Internet security resource used to entice cybercriminals 🕵️, deceiving them when they attempt illegal network intrusions. These traps help organizations understand attacker activity 📊, leading to stronger prevention measures. Honeypots contain no valuable data, acting as fake proxies for logging network traffic 📝.&lt;/p&gt;

&lt;p&gt;🔹 Working on Honeypots 🔹&lt;/p&gt;

&lt;p&gt;As an IT admin, you'd set up a honeypot that mimics a genuine system 🖥️ to outsiders. Honeypots capture:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Keystrokes by attackers ⌨️&lt;/li&gt;
&lt;li&gt;Attacker IP addresses 🌐&lt;/li&gt;
&lt;li&gt;Usernames and privileges used by attackers 👤&lt;/li&gt;
&lt;li&gt;Accessed, deleted, or altered data 📂&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;🔹 What Are Honeypots Used For? 🔹&lt;br&gt;
Honeypots capture data from unauthorized intruders who mistake them for legitimate network components. They're crucial for network defense 🛡️. Honeypots also aid in researching cyber attacker behavior and network interactions 🧐.&lt;/p&gt;

&lt;p&gt;🔹 Types of Honeypots 🔹&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Malware Honeypots 🦠&lt;/li&gt;
&lt;li&gt;Email Honeypots📧&lt;/li&gt;
&lt;li&gt;Database Honeypots🗃️&lt;/li&gt;
&lt;li&gt;Spider Honeypots🕷️&lt;/li&gt;
&lt;li&gt;Spam Honeypots 📬&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;🔹 Honeynets🔹&lt;br&gt;
Honeynets are networks of honeypots deployed in isolated virtual environments 🌐. They include various servers to record attacker activities and assess potential threats 📊.&lt;br&gt;
Image Credits: hacking articles&lt;br&gt;
📹&lt;strong&gt;Honeypot Introduction&lt;/strong&gt; (&lt;a href="https://youtu.be/o7DF5gpT8yw"&gt;https://youtu.be/o7DF5gpT8yw&lt;/a&gt;)&lt;br&gt;
📦 &lt;strong&gt;Honeypot&lt;/strong&gt;[&lt;a href="https://github.com/manikanta-suru/Honeypot.git"&gt;https://github.com/manikanta-suru/Honeypot.git&lt;/a&gt;]&lt;/p&gt;

</description>
      <category>security</category>
      <category>cloudsecuriy</category>
      <category>productivity</category>
      <category>aws</category>
    </item>
    <item>
      <title>𝐄𝐅𝐒 (𝐄𝐥𝐚𝐬𝐭𝐢𝐜 𝐅𝐢𝐥𝐞 𝐒𝐲𝐬𝐭𝐞𝐦) 𝐏𝐫𝐨𝐨𝐟 𝐨𝐟 𝐂𝐨𝐧𝐜𝐞𝐩𝐭 (𝐏𝐎𝐂):</title>
      <dc:creator>Manikanta Suru</dc:creator>
      <pubDate>Thu, 11 May 2023 08:02:33 +0000</pubDate>
      <link>https://dev.to/manikanta2023/--4cn3</link>
      <guid>https://dev.to/manikanta2023/--4cn3</guid>
      <description>&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--6XWAjbaC--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/cbru6tx3fm6gs2gdeuh4.JPG" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--6XWAjbaC--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/cbru6tx3fm6gs2gdeuh4.JPG" alt="Image description" width="782" height="443"&gt;&lt;/a&gt;#90daysofawschallenge #iammani&lt;br&gt;
Hey, connections!!👋&lt;/p&gt;

&lt;p&gt;🎯Let’s learn and grow together.&lt;/p&gt;

&lt;p&gt;📢 📢 📢&lt;/p&gt;

&lt;p&gt;🎯 Let’s Understand 𝐄𝐅𝐒 (𝐄𝐥𝐚𝐬𝐭𝐢𝐜 𝐅𝐢𝐥𝐞 𝐒𝐲𝐬𝐭𝐞𝐦) 𝐏𝐫𝐨𝐨𝐟 𝐨𝐟 𝐂𝐨𝐧𝐜𝐞𝐩𝐭 (𝐏𝐎𝐂):&lt;/p&gt;

&lt;p&gt;Full video link click: &lt;a href="https://lnkd.in/gaUuNN5W"&gt;https://lnkd.in/gaUuNN5W&lt;/a&gt;&lt;br&gt;
Happy learning,&lt;br&gt;
🍂🍂🍂🍂&lt;br&gt;
Sources: Google&lt;/p&gt;

&lt;p&gt;Follow me, Manikanta Suru, and Cloudnloud Tech Community on LinkedIn for more insightful knowledge &amp;amp; resources.&lt;/p&gt;

&lt;h1&gt;
  
  
  community #connections #learning #infrastructure #iammani
&lt;/h1&gt;

</description>
    </item>
    <item>
      <title>"𝐀𝐮𝐭𝐨𝐦𝐚𝐭𝐞 𝐄𝐂𝟐 𝐒𝐭𝐚𝐫𝐭 𝐚𝐧𝐝 𝐒𝐭𝐨𝐩 𝐰𝐢𝐭𝐡 𝐀𝐖𝐒 𝐋𝐚𝐦𝐛𝐝𝐚 𝐅𝐮𝐧𝐜𝐭𝐢𝐨𝐧𝐬" | 𝐩𝐨𝐜 |</title>
      <dc:creator>Manikanta Suru</dc:creator>
      <pubDate>Sun, 07 May 2023 14:45:38 +0000</pubDate>
      <link>https://dev.to/manikanta2023/--18b1</link>
      <guid>https://dev.to/manikanta2023/--18b1</guid>
      <description>&lt;h1&gt;
  
  
  90daysofawschallenge
&lt;/h1&gt;

&lt;p&gt;Hey, connections!!👋&lt;/p&gt;

&lt;p&gt;🎯Let’s learn and grow together.&lt;/p&gt;

&lt;p&gt;📢 📢 📢&lt;/p&gt;

&lt;p&gt;🎯 Let’s Understand "𝐀𝐮𝐭𝐨𝐦𝐚𝐭𝐞 𝐄𝐂𝟐 𝐒𝐭𝐚𝐫𝐭 𝐚𝐧𝐝 𝐒𝐭𝐨𝐩 𝐰𝐢𝐭𝐡 𝐀𝐖𝐒 𝐋𝐚𝐦𝐛𝐝𝐚 𝐅𝐮𝐧𝐜𝐭𝐢𝐨𝐧𝐬" | 𝐩𝐨𝐜 |&lt;/p&gt;

&lt;p&gt;Full video link click: &lt;a href="https://lnkd.in/giZEUSTZ"&gt;https://lnkd.in/giZEUSTZ&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Happy learning,&lt;/p&gt;

&lt;p&gt;🍂🍂🍂🍂&lt;/p&gt;

&lt;p&gt;Sources: Google&lt;/p&gt;

&lt;p&gt;Follow me, Manikanta Suru, and Cloudnloud Tech Community on LinkedIn for more insightful knowledge &amp;amp; resources.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Hacking Networks with Nmap (Education Purpose only)</title>
      <dc:creator>Manikanta Suru</dc:creator>
      <pubDate>Tue, 02 May 2023 17:26:11 +0000</pubDate>
      <link>https://dev.to/manikanta2023/hacking-networks-with-nmap-education-purpose-only-1a1k</link>
      <guid>https://dev.to/manikanta2023/hacking-networks-with-nmap-education-purpose-only-1a1k</guid>
      <description>&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--Nw8_BjFv--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/bgdpzboz49uxvt6su1ni.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--Nw8_BjFv--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/bgdpzboz49uxvt6su1ni.png" alt="Image description" width="772" height="452"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;🎯 Let's Understand ️ ️&lt;br&gt;
What is Nmap?&lt;br&gt;
Why use Nmap?&lt;br&gt;
Is Nmap safe to use?&lt;br&gt;
Installing Nmap on Linux.&lt;br&gt;
Scanning a Single Target.&lt;br&gt;
Scanning Multiple Targets.&lt;br&gt;
Scanning an IP Address Range.&lt;br&gt;
Scanning an Entire Subnet.&lt;br&gt;
Scan a Target List.&lt;br&gt;
Scanning and Excluding Targets&lt;br&gt;
Aggressive Scan.&lt;br&gt;
✍️ What is Nmap?&lt;br&gt;
Nmap (Network Mapper) is a free, open-source network exploration and security auditing tool. It is used to discover hosts and services on a computer network, thus creating a map of the network topology.&lt;br&gt;
Nmap uses various techniques to scan a network, including ping sweeps, port scanning, version detection, and OS detection. It can also perform advanced functions like scriptable interaction with the target, fingerprinting, and vulnerability detection.&lt;br&gt;
✍️ Why use Nmap?&lt;br&gt;
Nmap is often used by network administrators to manage and secure their networks by identifying vulnerabilities that may be exploited by attackers. Security professionals can also use it to perform penetration testing, which involves attempting to exploit vulnerabilities in a network or system to identify potential security threats.&lt;br&gt;
Nmap is a powerful tool that requires knowledge and skill to use effectively. It should only be used on networks that you have permission to scan and should be used with caution to avoid any unintended consequences.&lt;br&gt;
Network Mapping:&lt;br&gt;
Nmap can be used to discover hosts and services on a network, creating a map of the network topology. This can help network administrators to manage and secure their networks by identifying potential security risks and misconfigured devices.&lt;br&gt;
Vulnerability Scanning: &lt;br&gt;
Nmap can be used to identify vulnerabilities in hosts and services. By scanning for open ports and known vulnerabilities, Nmap can help security professionals to identify potential weaknesses in a system that could be exploited by attackers.&lt;br&gt;
Penetration Testing: &lt;br&gt;
Security professionals often use Nmap to perform penetration testing, which involves attempting to exploit vulnerabilities in a network or system to identify potential security threats.&lt;br&gt;
System Auditing:&lt;br&gt;
Nmap can be used to audit system configurations, including operating systems and network devices. This can help administrators to ensure that their systems are properly configured and that security policies are being enforced.&lt;br&gt;
Troubleshooting: &lt;br&gt;
Nmap can be used to troubleshoot network connectivity issues. By scanning for open ports and network services, Nmap can help identify issues with firewalls or misconfigured devices.&lt;br&gt;
Nmap is a safe tool to use as long as it is used responsibly and ethically. When used without permission, Nmap can be used for malicious purposes such as hacking, network attacks, or information theft. However, when used with permission, Nmap is a valuable tool for network administrators and security professionals to identify vulnerabilities in their networks and systems.&lt;br&gt;
✍️Is  Nmap safe to use?&lt;br&gt;
It's important to note that some network devices or systems may consider Nmap scans as a form of attack or intrusion, and may trigger security alarms or block the scan. Therefore, it's important to obtain permission from the owner of the network or system before running any Nmap scans. Additionally, it's important to use Nmap's various scanning options and features judiciously to avoid causing any damage to the target network or systems.&lt;br&gt;
Overall, Nmap is a safe and powerful tool when used responsibly and ethically. It's important to obtain permission, use caution, and respect the security and privacy of the target network or system when using Nmap.&lt;br&gt;
✍️ Installing Nmap on Linux?&lt;br&gt;
sudo apt-get update &amp;amp;&amp;amp; sudo apt-get update &lt;br&gt;
✍️ Scanning a Single Target?&lt;br&gt;
Nmap 192.168.1.12 &lt;br&gt;
✍ ️Scanning Multiple Targets?&lt;br&gt;
nmap [target1 IP or hostname] [target2 IP or hostname] [target3 IP or hostname] …&lt;br&gt;
✍️Scanning Multiple Targets?&lt;br&gt;
nmap 172.30.1.2 172.30.1.1&lt;br&gt;
✍️Scanning an Entire Subnet?&lt;br&gt;
nmap 172.30.1.2/24&lt;br&gt;
✍️Scanning an IP Address Range?&lt;br&gt;
nmap 172.30.1.2–100&lt;br&gt;
✍️Scan a Target List?&lt;br&gt;
✍️Scanning and Excluding Targets?&lt;br&gt;
✍️Aggressive Scan?&lt;br&gt;
👉 In case you would like to continue the discussion, you can always reach out to me on Twitter or on LinkedIn for professional networking, if you feel like following me on GitHub you can also do that.&lt;br&gt;
👉 Follow Cloudnloud Tech Community for more insightful knowledge &amp;amp; resources &amp;amp; CloudnLoud YouTube channel.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>🎯 Let’s Understand ️” 𝐂𝐫𝐞𝐚𝐭𝐢𝐧𝐠 𝐚 𝐒𝐜𝐚𝐥𝐚𝐛𝐥𝐞 𝐀𝐖𝐒 𝐈𝐧𝐟𝐫𝐚𝐬𝐭𝐫𝐮𝐜𝐭𝐮𝐫𝐞 𝐰𝐢𝐭𝐡 𝐀𝐮𝐭𝐨 𝐒𝐜𝐚𝐥𝐢𝐧𝐠 𝐚𝐧𝐝 𝐋𝐚𝐮𝐧𝐜𝐡 𝐂𝐨𝐧𝐟𝐢𝐠𝐮𝐫𝐚𝐭𝐢𝐨𝐧𝐬” POC</title>
      <dc:creator>Manikanta Suru</dc:creator>
      <pubDate>Mon, 24 Apr 2023 05:42:06 +0000</pubDate>
      <link>https://dev.to/manikanta2023/lets-understand-poc-4iaf</link>
      <guid>https://dev.to/manikanta2023/lets-understand-poc-4iaf</guid>
      <description>&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--esS-dZRg--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/ddt5hc5wsrnn1chew2ku.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--esS-dZRg--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/ddt5hc5wsrnn1chew2ku.png" alt="Image description" width="783" height="445"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Hey, connections!!👋&lt;/p&gt;

&lt;p&gt;🎯Let’s learn and grow together.&lt;/p&gt;

&lt;p&gt;📢 📢 📢&lt;/p&gt;

&lt;p&gt;🎯 Let’s Understand ️” 𝐂𝐫𝐞𝐚𝐭𝐢𝐧𝐠 𝐚 𝐒𝐜𝐚𝐥𝐚𝐛𝐥𝐞 𝐀𝐖𝐒 𝐈𝐧𝐟𝐫𝐚𝐬𝐭𝐫𝐮𝐜𝐭𝐮𝐫𝐞 𝐰𝐢𝐭𝐡 𝐀𝐮𝐭𝐨 𝐒𝐜𝐚𝐥𝐢𝐧𝐠 𝐚𝐧𝐝 𝐋𝐚𝐮𝐧𝐜𝐡 𝐂𝐨𝐧𝐟𝐢𝐠𝐮𝐫𝐚𝐭𝐢𝐨𝐧𝐬” POC&lt;/p&gt;

&lt;p&gt;Click the YouTube link. &lt;a href="https://lnkd.in/dPwNy4-Y"&gt;https://lnkd.in/dPwNy4-Y&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Happy learning,&lt;br&gt;
🍂🍂🍂🍂&lt;br&gt;
Sources: Google&lt;/p&gt;

</description>
    </item>
    <item>
      <title>"Creating a Scalable AWS Infrastructure with Auto Scaling and Launch Configurations"</title>
      <dc:creator>Manikanta Suru</dc:creator>
      <pubDate>Fri, 21 Apr 2023 04:53:31 +0000</pubDate>
      <link>https://dev.to/manikanta2023/creating-a-scalable-aws-infrastructure-with-auto-scaling-and-launch-configurations-39gm</link>
      <guid>https://dev.to/manikanta2023/creating-a-scalable-aws-infrastructure-with-auto-scaling-and-launch-configurations-39gm</guid>
      <description>&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--YHUwRKPZ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/mdz291y4vhk7a59or3z3.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--YHUwRKPZ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/mdz291y4vhk7a59or3z3.png" alt="Image description" width="783" height="445"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Hey, connections!!👋&lt;br&gt;
🎯Let's learn and grow together.&lt;br&gt;
📢 📢 📢&lt;br&gt;
🎯 Let's Understand ️ ️" 𝐂𝐫𝐞𝐚𝐭𝐢𝐧𝐠 𝐚 𝐒𝐜𝐚𝐥𝐚𝐛𝐥𝐞 𝐀𝐖𝐒 𝐈𝐧𝐟𝐫𝐚𝐬𝐭𝐫𝐮𝐜𝐭𝐮𝐫𝐞 𝐰𝐢𝐭𝐡 𝐀𝐮𝐭𝐨 𝐒𝐜𝐚𝐥𝐢𝐧𝐠 𝐚𝐧𝐝 𝐋𝐚𝐮𝐧𝐜𝐡 𝐂𝐨𝐧𝐟𝐢𝐠𝐮𝐫𝐚𝐭𝐢𝐨𝐧𝐬"&lt;br&gt;
Click the YouTube link &lt;a href="https://youtu.be/2gRbLGgw_0k"&gt;https://youtu.be/2gRbLGgw_0k&lt;/a&gt;&lt;br&gt;
Happy learning,&lt;br&gt;
🍂🍂🍂🍂&lt;br&gt;
Sources: Google&lt;br&gt;
Follow me, &lt;a class="mentioned-user" href="https://dev.to/manikanta"&gt;@manikanta&lt;/a&gt; Suru, and @Cloudnloud Tech Community on LinkedIn for more insightful knowledge &amp;amp; resources.&lt;/p&gt;

</description>
    </item>
  </channel>
</rss>
