Hacker News
- Assume the Worst: Enumerating AWS Roles Through ‘AssumeRole’ https://rhinosecuritylabs.com/aws/assume-worst-aws-assume-role-enumeration/ 6 comments
Linking pages
- Lesser Known Techniques for Attacking AWS Environments - tl;dr sec https://tldrsec.com/blog/lesser-known-aws-attacks/ 9 comments
- CloudGoat 2: The “Vulnerable by Design” AWS Deployment Tool https://rhinosecuritylabs.com/aws/introducing-cloudgoat-2/ 5 comments
- With No Laws To Guide It, Here's How Orlando Is Using Amazon's Facial Recognition Technology https://www.buzzfeednews.com/article/daveyalba/amazon-facial-recognition-orlando-police-department 4 comments
- Using AWS Account ID's for IAM User Enumeration - Rhino Security Labs https://rhinosecuritylabs.com/aws/aws-iam-user-enumeration/ 0 comments
Linked pages
- AWS IAM Privilege Escalation – Methods and Mitigation https://rhinosecuritylabs.com/aws/aws-privilege-escalation-methods-mitigation/ 18 comments
- GitHub - RhinoSecurityLabs/cloudgoat: CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool https://github.com/RhinoSecurityLabs/cloudgoat 8 comments
- CloudGoat: The ‘Vulnerable-by-Design’ AWS Environment - Rhino Security Labs https://rhinosecuritylabs.com/aws/cloudgoat-vulnerable-design-aws-environment/ 4 comments
- Pacu: The Open Source AWS Exploitation Framework - Rhino Security Labs https://rhinosecuritylabs.com/aws/pacu-open-source-aws-exploitation-framework/ 0 comments
Related searches:
Search whole site: site:rhinosecuritylabs.com
Search title: Assume the Worst: | Enumerating AWS Roles through ‘AssumeRole’ - Rhino Security Labs
See how to search.