Learn Information Security
A place to share links and articles that i have found helpful. This blog tends to be more offensive security minded. Basically it is a collection of notes that I will update periodically. None of this is set in stone, and I could very well be wrong on most of it. Just saying.
IaC – Infrastructure as Code
Cloud Formation Example
Imagine you’re a System Administrator tasked with setting up a new environment. Traditionally, this involves a long checklist: log into the console, click through menus to create a VPC, spin up three VMs, configure storage, attach security groups, and set up a load balancer. If you need a second environment for testing, you have to do it all over again, and hope you didn't miss a single checkbox. AWS Cloud Formation turns that manual checklist into a text file.
This is amusing to me
I have never seen anything even remotely close from the "other side".
Being able to program one's hate and disdain for things, instead of just ignoring, crossing the street, or moving on. Amazing to me how many of these Libertarian/ GOP/ MAGA/ Republicans just can't wait to get into other people's business and tell them what's what.
BLOCKADE Ebook Scanner Setup Guide
Adding Identity to the Authorization Layer
In the journey through information security, you will frequently encounter OAuth 2.0. While OAuth is excellent at authorization, it was never actually designed for authentication. To solve this, OIDC, or OpenID Connect, was created. Think of it this way: OAuth 2.0 is the key to a hotel room, while OIDC is the ID card that proves you are the person who booked it.
HTTP error code 401
The HTTP 401 "Unauthorized" status code is a client error response that signifies the request lacks valid authentication credentials for the target resource. Unlike a 403 "Forbidden" error (where you're known but denied access), a 401 means you haven't properly identified yourself or the identification provided was invalid (e.g., incorrect password, expired token). The server needs you to log in or provide better credentials.
🧑💻 Solutions for End-Users
When you encounter a 401 error as a general user, the fixes are typically simple authentication or browser maintenance steps:
Log In Again: The most common solution is to log out and then log back in. This ensures your browser gets a fresh, valid session cookie or authentication token from the server.
Clear Browser Data: An outdated or corrupted cache and cookies can cause the browser to send old or malformed authentication credentials. Clearing this data and logging in again often resolves the issue.
Refresh the Page: Sometimes, the server issue is transient. A simple page refresh can prompt the server to reissue a challenge or complete a delayed authorization check.
Check Network Restrictions: If you're on a corporate or protected network, the network itself might be interfering with the authentication handshake. Testing the site from a different network can rule out this possibility.
💻 Solutions for Developers and Administrators
For those managing the website or application, troubleshooting involves verifying the integrity of the authentication process:
Verify Authentication Headers: Ensure the client is correctly sending the necessary authentication data in the
Authorizationheader. This typically involves validating the format and content of Basic or Bearer tokens.Debug API Tokens and Permissions: If the client is using an API token, confirm that the token itself is active, unexpired, and has the necessary scopes or permissions to access the requested resource.
Review Server Configuration: Check all server-side settings, including firewalls, security plugins, and API gateway rules, to ensure they are not incorrectly stripping authentication headers or blocking valid requests.
Monitor Server Logs: The most reliable way to diagnose the failure is to check the server's access and error logs. These logs often provide specific details on why the authentication challenge failed (e.g., "invalid signature," "token expired").