- Exploiting AWS 'AssumeRole' API for IAM enumeration https://rhinosecuritylabs.com/aws/aws-role-enumeration-iam-p2/ 4 comments netsec
Linking pages
- Lesser Known Techniques for Attacking AWS Environments - tl;dr sec https://tldrsec.com/blog/lesser-known-aws-attacks/ 9 comments
- CloudGoat 2: The “Vulnerable by Design” AWS Deployment Tool https://rhinosecuritylabs.com/aws/introducing-cloudgoat-2/ 5 comments
- Use CloudTrail to Pivot to AWS Accounts During Cloud… | Bishop Fox https://bishopfox.com/blog/using-cloudtrail-to-pivot-to-aws-accounts 3 comments
Linked pages
- CVE-2022-25165: Privilege Escalation to SYSTEM in AWS VPN Client - Rhino Security Labs https://rhinosecuritylabs.com/aws/cve-2022-25165-aws-vpn-client/ 9 comments
- GitHub - RhinoSecurityLabs/cloudgoat: CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool https://github.com/RhinoSecurityLabs/cloudgoat 8 comments
- CVE-2021-38112: AWS WorkSpaces Remote Code Execution - Rhino Security Labs https://rhinosecuritylabs.com/aws/cve-2021-38112-aws-workspaces-rce/ 0 comments
Related searches:
Search whole site: site:rhinosecuritylabs.com
Search title: Unauthenticated AWS Role Enumeration (IAM Revisited)
See how to search.