Media Summary: Enterprises are increasingly running their IT and application infrastructure natively in the OWASP Sofia Chapter is proud to present a session Starting off as a low-privileged user, a misconfiguration in the Lambda service made lateral movement to a user

Hacker Days Understanding Aws Cloud Attacks Using Cloudgoat - Detailed Analysis & Overview

Enterprises are increasingly running their IT and application infrastructure natively in the OWASP Sofia Chapter is proud to present a session Starting off as a low-privileged user, a misconfiguration in the Lambda service made lateral movement to a user We start off as a low-privileged user who can perform IAM Get and IAM List on all resources. In addition, this user can assume a ... The objective of this scenario was to gain access to an RDS instance. We were provided We start off as a fairly high-privileged user who can perform multiple IAM and EC2 API calls.

Resources: Enroll in my Courses (search for Tyler Ramsbey) Support me on Ko-Fi ...

Photo Gallery

Hacker Days: Understanding AWS cloud attacks using CloudGoat
[OWASP Sofia] Kavisha Sheth - Understanding AWS cloud attacks using CloudGoat
Hacking in the Cloud - Cloudgoat: ecs_takeover
Hacking in the Cloud - Cloudgoat: ec2_ssrf
Hacking Cloud – 1(AWS) A(manual cloudgoat scenarios)
Hacking in the Cloud - Cloudgoat: lambda_privesc
AWS Hacking 101: How Cloud Attacks Actually Start
Hacking in the Cloud - Cloudgoat: cloud_breach_s3
AWS IoT In Cloud Computing  | Ethical Hacking Tutorial | Craw Cyber Security
Hacking in the Cloud - Cloudgoat: rce_web_app
Hacking in the Cloud - Cloudgoat: iam_privesc_by_attachment
Introduction to CloudGoat -- [Learn AWS Pentesting!]
Sponsored
Sponsored
View Detailed Profile
Sponsored
Sponsored