Gerald Benischke
banner
beny23.github.io
Gerald Benischke
@beny23.github.io
Maker, breaker and fixer of software. Adventures in #appsec and #agile: beny23.github.io he/him
Needing to throttle Pro and Business while Pro+ and Enterprise is fine? Sounds like a cost saving incident to me ;-)
January 7, 2026 at 7:42 PM
Unite in opposition?
November 17, 2025 at 4:39 PM
TIL caffeine keeps me awake:
November 13, 2025 at 8:45 AM
I updated the relevant @xkcd.com
November 6, 2025 at 8:54 AM
October 31, 2025 at 12:43 AM
Brb, just broom scrolling
October 28, 2025 at 8:29 AM
Little Bobby Tables would proud. imgs.xkcd.com/comics/explo...
October 15, 2025 at 9:43 AM
Just like all the crypto mining infrastructure was reused. Wait what? ;-)
October 11, 2025 at 11:01 AM
October 11, 2025 at 9:29 AM
@safesecs.bsky.social closing #bsidesncl - thank you to everyone, it was fab!!!
September 27, 2025 at 5:01 PM
It wouldn’t be a @rnbwkat.bsky.social talk without honeypots!

Great whirlwind tour of “just do the fucking basics already”!!!

Loved it.

9/fin
September 27, 2025 at 4:56 PM
It’s funny how a simple hardcoded credential can lead to complete takeover: 8/n
September 27, 2025 at 4:56 PM
Shodan for storage buckets: grayhatwarfare.com

And prowler.com to find misconfigured objects. 7/n
September 27, 2025 at 4:56 PM
Some tools to help: 6/n
September 27, 2025 at 4:56 PM
It’s the usual suspects: 5/n
September 27, 2025 at 4:56 PM
It takes minutes for a leaked key to be exploited. Usually it’s crypto miners. But sometimes crypto is used as a decoy. 4/n
September 27, 2025 at 4:56 PM
It’s used to be much work pentesting. Now it’s just about finding misconfigrations. Or people accidentally uploading creds. 3/n
September 27, 2025 at 4:56 PM
With 1400 different privileges, is it any wonder that it’s so easy to misconfigure. 2/n
September 27, 2025 at 4:56 PM
@rnbwkat.bsky.social doing the lock note at #bsidesncl about cloud misconfiguration.

So most of the incidents then.

1/n
September 27, 2025 at 4:56 PM
Top tip: “different phones for fun and profit”. And adopt an elderly person.

That was fun!

But how do I launder money, we’ve not learned that yet ;-)

8/fin
September 27, 2025 at 2:26 PM
Incident maps illustrate dangers and possible mitigations. 7/n
September 27, 2025 at 2:26 PM
Then we look at incidents that can lead to dirty money. 6/n
September 27, 2025 at 2:26 PM
And of course it’s not really anonymous because the blockchain is public after all. Despite all kinds of crypto tech that enables laundering. 5/n
September 27, 2025 at 2:26 PM
There’s a fundamental weakness in crypto. It doesn’t care who should own it. Only knowing the private key matters.

Make a mistake: all your money gone.
Lose your key: all your money gone.

Great - future of finance right there.

4/n
September 27, 2025 at 2:26 PM
Can’t talk about money laundering without the blockchain. Crypto is an enabler. How is this not illegal. 💯

3/n
September 27, 2025 at 2:26 PM