Extracting Data From S3 As The Attacker
Our previous blog post discussed securing S3 buckets (you can find it here), but how might you steal data from those S3 buckets if you were an attacker? This blog post will explore some...
A Security Blog With A Focus On The Cloud
Our previous blog post discussed securing S3 buckets (you can find it here), but how might you steal data from those S3 buckets if you were an attacker? This blog post will explore some...
If you’ve been using AWS, you’ve undoubtedly heard of S3 buckets. S3 buckets provide object-level storage for almost unlimited amounts of data – S3 also supports multiple data tiers to help you lower costs...
An AWS policy is a JSON document that defines a user role, or service’s permissions. AWS provides a bunch of pre-configured policies, otherwise known as AWS-managed policies. Alternatively, you can create your own, which...
Elastic Disaster Recovery Service (DRS) is a disaster recovery service provided within AWS that allows you to “recover” from disasters both on-premiss and in the cloud. But, how does it actually work and is...
AWS Organizations allows you to manage multiple accounts under one management account, but how do we ensure they are secure? Creating A New “child” Account. Log in to the console of the account you...
What happens when IAM:PassRole is not configured correctly? A quick demo of an IAM:PassRole attack.
Kali is a pen-testers best friend, a Linux OS packed full of tools to help on all engagements. It’s also a great OS for using with “Hack The Box” or “Try Hack Me”. However,...
Have You been considering the AWS Solutions Architect Associate exam? Been putting it off for some time? Or have you just started working with AWS and now feel that it’s time for the exam?...
I thought this would be a good ice breaker as a first blog post since MattSec is being hosted on AWS Lightsail. The following tutorial will show you how to set up a Lightsail...