<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Infrastructure on Shadow Engineering</title>
    <link>https://shadow.engineering/tags/infrastructure/</link>
    <description>Recent content in Infrastructure on Shadow Engineering</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en</language>
    <copyright>© 2026 </copyright>
    <lastBuildDate>Sat, 23 Apr 2022 11:30:03 +0000</lastBuildDate><atom:link href="https://shadow.engineering/tags/infrastructure/index.xml" rel="self" type="application/rss+xml" />
    
    <item>
      <title>Iterations of this Site</title>
      <link>https://shadow.engineering/posts/iterations_of_this_site/</link>
      <pubDate>Sat, 23 Apr 2022 11:30:03 +0000</pubDate>
      
      <guid>https://shadow.engineering/posts/iterations_of_this_site/</guid>
      <description>&lt;p&gt;In 2018 I applied for a position at Google, to start the day long series of interviews I got asked one simple question:&lt;/p&gt;&#xA;&lt;blockquote&gt;&lt;p&gt;How would you create a secure web page?&lt;/p&gt;&#xA;&lt;/blockquote&gt;&lt;p&gt;I responded at first about securing the host, implementing SELinux, putting SSH on a high port with a certificate, sticking it behind a WAF. I had started to go into detail about the CI/CD pipeline when I was interrupted by the interviewer asking if I had heard of things such as HSTS and HKPI. I confessed that I hadn&amp;rsquo;t, and knew there must have been a whole world of things that I simply hadn&amp;rsquo;t had exposure to, so I took a mental note to go away, build myself a website and to try and experiment.&lt;/p&gt;</description>
      
    </item>
    
    <item>
      <title>Diagnosing Difficult Network Issues</title>
      <link>https://shadow.engineering/posts/diagnosing_difficult_network_issues/</link>
      <pubDate>Mon, 07 Mar 2022 11:30:03 +0000</pubDate>
      
      <guid>https://shadow.engineering/posts/diagnosing_difficult_network_issues/</guid>
      <description>&lt;h2 class=&#34;relative group&#34;&gt;Background&#xA;    &lt;div id=&#34;background&#34; class=&#34;anchor&#34;&gt;&lt;/div&gt;&#xA;    &#xA;    &lt;span&#xA;        class=&#34;absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none&#34;&gt;&#xA;        &lt;a class=&#34;text-primary-300 dark:text-neutral-700 !no-underline&#34; href=&#34;#background&#34; aria-label=&#34;Anchor&#34;&gt;#&lt;/a&gt;&#xA;    &lt;/span&gt;&#xA;    &#xA;&lt;/h2&gt;&#xA;&lt;p&gt;This is the story of a case I worked a long time ago. At the time I was working in an infrastructure development team. We had a VMWare vCenter 5.5 cluster that started as a prototype, but soon became mission critical (as is the way for those systems sometime). Other than overutilising the hardware with random VMs it had been functioning seemlessly with no issues for a long time, and then developed an interesting fault. The vCenter cluster would disconnect from the storage multiple times an hour.&lt;/p&gt;</description>
      
    </item>
    
    <item>
      <title>Easter Eggs</title>
      <link>https://shadow.engineering/posts/easter_eggs/</link>
      <pubDate>Tue, 23 Nov 2021 17:00:00 +1000</pubDate>
      
      <guid>https://shadow.engineering/posts/easter_eggs/</guid>
      <description>&lt;p&gt;As I outlined in &lt;a href=&#34;https://shadow.engineering/posts/iterations_of_this_site/&#34; title=&#34;iterations of this site&#34;&gt;Iterations of this Site&lt;/a&gt;, this website has been a project for me to learn and experiment. As a part of that I&amp;rsquo;ve included 10 easter eggs littered around the site in various places, they&amp;rsquo;re not overly complex, but they provide a chance for others to learn about some of the different elements of the site like I have in building it.&lt;/p&gt;&#xA;&lt;p&gt;If you&amp;rsquo;ve uncovered all 10 of them, I&amp;rsquo;d love for you to let me know, send me a message to my &lt;a href=&#34;https://twitter.com/0x706972686f&#34;  target=&#34;_blank&#34; rel=&#34;noreferrer&#34;&gt;twitter&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;For those keen on a bigger challenge, I provide the below. Some bafoon has attempted to encrypt a super sensitive file, but it appears they&amp;rsquo;ve done it in the worst way possible!&lt;/p&gt;</description>
      
    </item>
    
    <item>
      <title>Project Chaos</title>
      <link>https://shadow.engineering/posts/project_chaos/</link>
      <pubDate>Sun, 04 Apr 2021 11:30:03 +0000</pubDate>
      
      <guid>https://shadow.engineering/posts/project_chaos/</guid>
      <description>&lt;p&gt;Meet Scarlett Reynolds, a new starting ICT Sales Representative, for a small technology start up named Eigar Technologies, that&amp;rsquo;s based in Sydney, Australia.&#xA;&lt;figure&gt;&lt;img&#xA;    class=&#34;my-0 rounded-md&#34;&#xA;    loading=&#34;lazy&#34;&#xA;    decoding=&#34;async&#34;&#xA;    fetchpriority=&#34;auto&#34;&#xA;    alt=&#34;Scarlett&#34;&#xA;    width=&#34;768&#34;&#xA;    height=&#34;768&#34;&#xA;    src=&#34;https://shadow.engineering/posts/project_chaos/scarlett.jpg&#34;&#xA;    srcset=&#34;https://shadow.engineering/posts/project_chaos/scarlett.jpg 800w, https://shadow.engineering/posts/project_chaos/scarlett.jpg 1280w&#34;&#xA;    sizes=&#34;(min-width: 768px) 50vw, 65vw&#34;&#xA;    data-zoom-src=&#34;https://shadow.engineering/posts/project_chaos/scarlett.jpg&#34;&gt;&lt;/figure&gt;&#xA;&lt;/p&gt;&#xA;&lt;p&gt;She studied at Arthur Phillip High School in Parramatta, before graduating in a double degree in IT and Business from UTS in 2013. She&amp;rsquo;s a virgo and her first car was a &amp;lsquo;96 Corolla, and she doesn&amp;rsquo;t exist.&lt;/p&gt;&#xA;&lt;p&gt;Neither does Eigar Technologies. In fact, the name Eigar Technologies is a portmanteau of &lt;a href=&#34;https://en.wikipedia.org/wiki/Eiger&#34;  target=&#34;_blank&#34; rel=&#34;noreferrer&#34;&gt;Eiger&lt;/a&gt;, a mountain in the Swiss Alps, and &lt;a href=&#34;https://en.wikipedia.org/wiki/EICAR_test_file&#34;  target=&#34;_blank&#34; rel=&#34;noreferrer&#34;&gt;EICAR&lt;/a&gt;, the test file associated with Antivirus program validation.&#xA;&lt;figure&gt;&lt;img&#xA;    class=&#34;my-0 rounded-md&#34;&#xA;    loading=&#34;lazy&#34;&#xA;    decoding=&#34;async&#34;&#xA;    fetchpriority=&#34;auto&#34;&#xA;    alt=&#34;Logo and Signature&#34;&#xA;    width=&#34;600&#34;&#xA;    height=&#34;150&#34;&#xA;    src=&#34;https://shadow.engineering/posts/project_chaos/sig.gif&#34;&#xA;    srcset=&#34;https://shadow.engineering/posts/project_chaos/sig.gif 800w, https://shadow.engineering/posts/project_chaos/sig.gif 1280w&#34;&#xA;    sizes=&#34;(min-width: 768px) 50vw, 65vw&#34;&#xA;    data-zoom-src=&#34;https://shadow.engineering/posts/project_chaos/sig.gif&#34;&gt;&lt;/figure&gt;&#xA;&lt;/p&gt;</description>
      
    </item>
    
    <item>
      <title>Adventures from the Other Side of Phishing</title>
      <link>https://shadow.engineering/posts/teach_a_man_to_phish/</link>
      <pubDate>Tue, 01 Oct 2019 00:00:00 +1000</pubDate>
      
      <guid>https://shadow.engineering/posts/teach_a_man_to_phish/</guid>
      <description>&lt;h2 class=&#34;relative group&#34;&gt;Background&#xA;    &lt;div id=&#34;background&#34; class=&#34;anchor&#34;&gt;&lt;/div&gt;&#xA;    &#xA;    &lt;span&#xA;        class=&#34;absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none&#34;&gt;&#xA;        &lt;a class=&#34;text-primary-300 dark:text-neutral-700 !no-underline&#34; href=&#34;#background&#34; aria-label=&#34;Anchor&#34;&gt;#&lt;/a&gt;&#xA;    &lt;/span&gt;&#xA;    &#xA;&lt;/h2&gt;&#xA;&lt;p&gt;&lt;figure&gt;&lt;img&#xA;    class=&#34;my-0 rounded-md&#34;&#xA;    loading=&#34;lazy&#34;&#xA;    decoding=&#34;async&#34;&#xA;    fetchpriority=&#34;auto&#34;&#xA;    alt=&#34;Phish Site&#34;&#xA;    width=&#34;968&#34;&#xA;    height=&#34;530&#34;&#xA;    src=&#34;https://shadow.engineering/posts/teach_a_man_to_phish/image1_hu_1bfab189d9c752e4.png&#34;&#xA;    srcset=&#34;https://shadow.engineering/posts/teach_a_man_to_phish/image1_hu_1bfab189d9c752e4.png 800w, https://shadow.engineering/posts/teach_a_man_to_phish/image1.png 1280w&#34;&#xA;    sizes=&#34;(min-width: 768px) 50vw, 65vw&#34;&#xA;    data-zoom-src=&#34;https://shadow.engineering/posts/teach_a_man_to_phish/image1.png&#34;&gt;&lt;/figure&gt;&#xA;&lt;/p&gt;&#xA;&lt;p&gt;I know it may be hard to believe, but this poor looking website above is not the legitimate NAB website, it’s a poor mockery of a NABs internet banking portal based off a phishing kit we’ve seen. How do I know this? Because I made it.&lt;/p&gt;&#xA;&lt;p&gt;It stemmed from a weird need, we often need to showcase our phishing capability to seniors in the bank and as a good educational piece to students and employees. Depending on who we’re showcasing to we’re either demonstrating how we respond and manage the risk to customers, or educating users for simple things they can identify to determine the legitimacy. It also helps to showcase the other side of the phishers themselves; a lot of people don’t seem to realise what’s being gathered.&lt;/p&gt;</description>
      
    </item>
    
    <item>
      <title>Electric Blue - Lessons from a blue team securing Azure</title>
      <link>https://shadow.engineering/posts/electric_blue/</link>
      <pubDate>Sun, 07 Apr 2019 17:00:00 +1000</pubDate>
      
      <guid>https://shadow.engineering/posts/electric_blue/</guid>
      <description>&lt;div style=&#34;position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;&#34;&gt;&#xA;      &lt;iframe allow=&#34;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share; fullscreen&#34; loading=&#34;eager&#34; referrerpolicy=&#34;strict-origin-when-cross-origin&#34; src=&#34;https://www.youtube.com/embed/S-MZRZg-pGo?autoplay=0&amp;amp;controls=1&amp;amp;end=0&amp;amp;loop=0&amp;amp;mute=0&amp;amp;start=0&#34; style=&#34;position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;&#34; title=&#34;YouTube video&#34;&gt;&lt;/iframe&gt;&#xA;    &lt;/div&gt;&#xA;&#xA;&lt;p&gt;At the end of 2018, NAB built out it&amp;rsquo;s extensive cloud environment. As a security analyst who had not had a lot of exposure to cloud environments, it provided new challenges and lessons and I wanted to share that with the world. Thanks to Crikeycon and NAB for letting me share those lessons.&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Slides:&lt;/strong&gt; &lt;a href=&#34;https://shadow.engineering/posts/electric_blue/electricblue.pdf&#34; &gt;PDF&lt;/a&gt; | &lt;a href=&#34;https://shadow.engineering/posts/electric_blue/electricblue.pptx&#34; &gt;PPXT&lt;/a&gt;&lt;/p&gt;</description>
      
    </item>
    
  </channel>
</rss>
