- AWS Privilige Escalation - Methods and Mitigation https://rhinosecuritylabs.com/aws/aws-privilege-escalation-methods-mitigation/ 17 comments netsec
Linking pages
- AWS IAM explained for Red and Blue teams | by Security Shenanigans | InfoSec Write-ups https://medium.com/@securityshenaningans/aws-iam-explained-for-red-and-blue-teams-2dda8b20fbf7 19 comments
- GitHub - RhinoSecurityLabs/AWS-IAM-Privilege-Escalation: A centralized source of all AWS IAM privilege escalation methods released by Rhino Security Labs. https://github.com/rhinosecuritylabs/aws-iam-privilege-escalation 14 comments
- Exploiting AWS IAM permissions for total cloud compromise: a real world example (1/2) | by Security Shenanigans | InfoSec Write-ups https://medium.com/@securityshenaningans/exploiting-fine-grained-aws-iam-permissions-for-total-cloud-compromise-a-real-world-example-part-5a2f3de4be08 13 comments
- Exploiting AWS IAM permissions for total cloud compromise: a real world example (2/2) | by Security Shenanigans | InfoSec Write-ups https://medium.com/@securityshenaningans/exploiting-aws-iam-permissions-for-total-cloud-compromise-a-real-world-example-part-2-2-f27e4b57454e 7 comments
- Assume the Worst: | Enumerating AWS Roles through ‘AssumeRole’ - Rhino Security Labs https://rhinosecuritylabs.com/aws/assume-worst-aws-assume-role-enumeration/ 6 comments
- CloudGoat 2: The “Vulnerable by Design” AWS Deployment Tool https://rhinosecuritylabs.com/aws/introducing-cloudgoat-2/ 5 comments
- CloudGoat: The ‘Vulnerable-by-Design’ AWS Environment - Rhino Security Labs https://rhinosecuritylabs.com/aws/cloudgoat-vulnerable-design-aws-environment/ 4 comments
- Identify and Exploit Intentionally Vulnerable IAM… | Bishop Fox https://labs.bishopfox.com/tech-blog/iam-vulnerable-an-aws-iam-privilege-escalation-playground 4 comments
- Escalating AWS IAM Privileges with an Undocumented CodeStar API https://rhinosecuritylabs.com/aws/escalating-aws-iam-privileges-undocumented-codestar-api/ 3 comments
- AWS Identity Center (formerly known as AWS SSO): A Guide to Privilege Escalation and Identity and Access Management | CloudQuery https://www.cloudquery.io/blog/aws-priv-esc-identity-center 3 comments
- GitHub - DataDog/stratus-red-team: Granular, Actionable Adversary Emulation for the Cloud https://github.com/Datadog/stratus-red-team/ 1 comment
- A Guide to Improving Security Through Infrastructure-as-Code – NCC Group Research https://research.nccgroup.com/2022/09/19/a-guide-to-improving-security-through-infrastructure-as-code/ 0 comments
- IAM PassRole: A Difficult Privilege Escalation Permission - Ermetic https://ermetic.com/whats-new/blog/auditing-passrole-a-problematic-privilege-escalation-permission/ 0 comments
- IAM Vulnerable - Assessing the AWS Assessment Tools | Bishop Fox https://labs.bishopfox.com/tech-blog/iam-vulnerable-assessing-the-aws-assessment-tools 0 comments
- The Urgent Threat of Ransomware to S3 Buckets Due to Misconfigurations - Ermetic https://ermetic.com/blog/aws/new-research-the-urgent-threat-of-ransomware-to-s3-buckets/ 0 comments
- CloudGoat goes Serverless: A walkthrough of Vulnerable Lambda Functions - Rhino Security Labs https://rhinosecuritylabs.com/cloud-security/cloudgoat-vulnerable-lambda-functions/ 0 comments
- Bypassing Little Snitch Firewall with Empty TCP Packets - Rhino Security Labs https://rhinosecuritylabs.com/network-security/bypassing-little-snitch-firewall/ 0 comments
Linked pages
- Penetration Testing Amazon Web Services (AWS) - Rhino Security Labs https://rhinosecuritylabs.com/penetration-testing/penetration-testing-aws-storage/ 26 comments
- Cloud Security Risks (P2): CSV Injection in AWS CloudTrail - Rhino Security Labs https://rhinosecuritylabs.com/aws/cloud-security-csv-injection-aws-cloudtrail/ 8 comments
- IAM policy elements: Variables and tags - AWS Identity and Access Management https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_variables.html 5 comments
Related searches:
Search whole site: site:rhinosecuritylabs.com
Search title: AWS IAM Privilege Escalation – Methods and Mitigation
See how to search.