Hacker News
- The Capital One Breach and “Cloud_breach_s3” CloudGoat Scenario https://rhinosecuritylabs.com/aws/capital-one-cloud_breach_s3-cloudgoat/ 2 comments
- New AWS "vulnerable by design" CloudGoat scenario inspired by the Capital One breach https://rhinosecuritylabs.com/aws/capital-one-cloud_breach_s3-cloudgoat/ 29 comments netsec
Linked pages
- CVE-2022-25165: Privilege Escalation to SYSTEM in AWS VPN Client - Rhino Security Labs https://rhinosecuritylabs.com/aws/cve-2022-25165-aws-vpn-client/ 9 comments
- GitHub - RhinoSecurityLabs/cloudgoat: CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool https://github.com/RhinoSecurityLabs/cloudgoat 8 comments
- CloudGoat 2: The “Vulnerable by Design” AWS Deployment Tool https://rhinosecuritylabs.com/aws/introducing-cloudgoat-2/ 5 comments
- CloudGoat Official Walkthrough Series: “rce_web_app” - Rhino Security Labs https://rhinosecuritylabs.com/aws/cloudgoat-walkthrough-rce_web_app/ 3 comments
- Shared Responsibility Model - Amazon Web Services (AWS) https://aws.amazon.com/compliance/shared-responsibility-model/ 0 comments
Related searches:
Search whole site: site:rhinosecuritylabs.com
Search title: The Capital One Breach & “cloud_breach_s3” CloudGoat Scenario
See how to search.