- Part 2 of my writeup: Exploiting fine-grained AWS IAM permissions for total cloud compromise: a real world example - @securfreakazoid https://medium.com/@securityshenaningans/exploiting-aws-iam-permissions-for-total-cloud-compromise-a-real-world-example-part-2-2-f27e4b57454e 7 comments netsec
Linking pages
Linked pages
- Upgrading Simple Shells to Fully Interactive TTYs - ropnop blog https://blog.ropnop.com/upgrading-simple-shells-to-fully-interactive-ttys/ 27 comments
- Medium https://medium.com/m/signin?isDraft=1&operation=login&redirect=https%3A%2F%2Fmedium.com%2F%40jamie_34747%2F79d382edf22b%3Fsource%3D 19 comments
- AWS IAM Privilege Escalation – Methods and Mitigation https://rhinosecuritylabs.com/aws/aws-privilege-escalation-methods-mitigation/ 18 comments
- Run commands on your Linux instance at launch - Amazon Elastic Compute Cloud https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/user-data.html 16 comments
- Exploiting AWS IAM permissions for total cloud compromise: a real world example (1/2) | by Security Shenanigans | InfoSec Write-ups https://medium.com/@securityshenaningans/exploiting-fine-grained-aws-iam-permissions-for-total-cloud-compromise-a-real-world-example-part-5a2f3de4be08 13 comments