Juan BernerDesigning for exploitationAn overview of the possible future of automated exploitation systems and how we could defend against them14 min read·Jan 14, 2020--1--1
Juan BernerBuilding Your Own Web Application Firewall as a Service And Forgetting about False PositivesThe following post is a reproduction of a paper of mine which was included in the In Depth Security Vol. III book which is compiled by the…15 min read·Jan 3, 2020----
Juan BernerDetecting attacks and improving response through the use of real time security featuresAn overview on the benefits of using real time features in SIEM’s13 min read·Aug 22, 2019----
Juan BernerExploiting A/B Testing for Fun and Profit (Part 2)This is the second part of a post based on a talk I gave in the Ekoparty security conference in 2016 on exploiting A/B testing frameworks.4 min read·Aug 13, 2019----
Juan BernerExploiting A/B Testing for Fun and Profit (Part 1)This post is based on a talk I gave at the Ekoparty security conference in 2016. Given the amount of requests I had on the subject I’m…8 min read·Aug 13, 2019----
Juan BernerExpanding labeled datasets through correlated featuresAn approach to improve model generalisation10 min read·Jul 22, 2019----
Juan BernerReducing your Google Pub/Sub costs over 95% by micro-batching with Google Cloud StorageUsing streams to separate components logic5 min read·Mar 28, 2019--3--3
Juan BernerPersistant GCP backdoors with Google’s Cloud ShellCloud Shell GCP Google Cloud Security5 min read·Oct 27, 2018----
Juan BernerAuditing ssh activity with docker containersSince I got several request of similar ventures I’m writing a post on a way to log ssh connections with Docker while mentioning other…3 min read·Feb 18, 2016----
Juan BernerBlocking docker from the instance metadata service in AWS and OpenstackOne of the many benefits of docker is to contain applications in their own “stacks” which improves their security. Yet an issue is that in…2 min read·Aug 31, 2015----