Hello! I have been using (and loving) Pomerium Enterprise for the past few months. Do you have an application that doesn’t have adequate access control or logging? Then Pomerium is the tool for you. It is an incredibly powerful and versatile zero-trust proxy (and no, that’s not a buzzword in this case). This guide will…
Google Workspace – useful GAM commands for calendar privacy
I just had a problem where Google Calendar’s default privacy setting was changed to “freeBusy” but didn’t replicate to all users. Looking into it, the privacy change is only applied if the user hasn’t changed their calendar’s default settings. It’s not clear what settings influence this. Anyway, we needed to use GAM to fix the…
GSUITE / Google Workspace – How to transform a user account into a group and keep all e-mails
Edit (15/02): Thanks to hjkimbrian for warning that there is no way to backup emails from a group. Do you have user accounts in your org that are “shared” between your employees?If you do, that’s a big no no. Account sharing is a horrible practice and is basically a ticking clock to some security incident…
Migrating Primary Domains in Gsuite (Google Workspace) – An Epic Odyssey
Edit: Thanks to UmzuzuJoe for reminding me about the necessity to update groups also. This post is based on my personal experience changing Gsuite primary domains in a medium sized organization. I hope to give you the basic idea of how your migartion should work and what to exepect – and most importantly: tell you…
How to run your own realistic Phishing Campaign easily and on a budget.
Phishing campaigns are useful for training your employees against common techniques (if you’re on the blue side) or to get some cr3ds (if you’re on the red side). This post is geared towards those on the blue side of things, but it can also be useful for red teamers and pentesters. The techniques and tools…
GCP – How to automatically export backups (MySQL and instances) to other places (AWS, Offline, etc…)
GCP has a pretty good backup system which is really easy to configure. For instances, you can schedule automatic snapshots and also convert theses snapshots to images whenever you want.For MySQL databases (not sure about the other types) you can schedule backups which are stored in a neat “full backup + incremental backups” to save…
How to create an alert in GCP for a specific event (ex: Modifying a firewall rule)
Say you want to be notified everytime a specific event occurs in your GCP project or organization such as an admin being added, a bucket being created, a firewall rule being modified, etc… How should you do it? After some trial and error, i have found that the method below gives the best results. Some…
How I passed the GCIH Exam with a score of 96%
On 17/07/2019, after many weekends of studying and preparation, i finally passed the GCIH exam. I was impressed by my final score, since on the practice exams i had only scored about 84-86%. I managed to get into the SANS Advisory Board and now my mailbox is filled with juicy discussions about lots of cool…
Eu
Views: 40
How to copy data from an Excel Spreadsheet protected by Information Rights Management (IRM).
Note: This applies to cases where you have editing privileges but no copy privileges. I haven’t tested other cases. The enterprise edition of Office 365 contains a feature called “Information Rights Management” (IRM). It allows you to designate edit/copy/view privileges on Office files for specific users (or groups) in your company. I honestly had no…