Author Archives: hensonsecuritytools

Getting AWS IAM info via AWS CLI and Linux

Hi friends, I wrote a script that is useful for getting AWS IAM info: [ account number, users, list of groups to which each user belongs and any policies attached directly to the user ] in one place.  The script … Continue reading

Posted in AWS, AWS Certified Solutions Architect, Uncategorized | Leave a comment

AWS: Find Private IP addresses attached to Security Groups

Hi friends. Ever wonder how to get  dynamic private IP addresses (say ones assigned to an internal ALB) associated with your Security Groups? Ok to start, this is crude, I’ll admit it – but it works – and when I … Continue reading

Posted in Uncategorized | Leave a comment

PaloAlto VM Firewalls with AWS ELB/ALB

Hey friends – wanted to continue sharing my knowledge as I uncover how to use Palo Alto FW inside AWS. Here is some information about this Cloud Formation Template by Palo Alto. Basically, the link above leads to a collection … Continue reading

Posted in AWS, AWS Certified Solutions Architect, Palo Alto FW, Palo Alto Networks | Tagged | Leave a comment

PaloAlto’s “fix” for making VM Series FW work with AWS ELB

I want to share my experience using Palo Alto FW in AWS ( using Terraform ). Palo Alto has some good examples out there of how their stuff works with Terraform and AWS, such as this github repo for thier … Continue reading

Posted in AWS, Palo Alto FW, Palo Alto Networks | Leave a comment

AWS CLI Cheet Sheet

S3 # list all S3 buckets aws s3 ls #Delete an S3 bucket and all its contents aws s3 rb s3://bucket-name –force # Recursively copy a directory and its subfolders from your PC to Amazon S3 aws s3 cp MyFolder … Continue reading

Posted in AWS, AWS Certified Solutions Architect | Tagged | Leave a comment

Front row perspective from Brian Krebs’ 2017 Keynote!

  I had the amazing honor of getting front row for Brian Krebs’ KeyNote speech at the SailPoint Navigate Conference Last week in Austin, TX! Brian is an exceptional a Public Speaker, just as he is an exceptional writer. Krebs … Continue reading

Posted in Cyber Security, Ransomware | Leave a comment

Who is talking to Alexa?

It seems like only a week after I wrote about the need for Voice Authentication on Alexa, Engadget published this article about how Siri and Alexa are Vulnerable to nefarious commands.  Basically researchers were sending commands in ultra high frequencies and getting the … Continue reading

Posted in Uncategorized | Leave a comment