Extracting Data From S3 As The Attacker
Our previous blog post discussed securing S3 buckets (you can find it here), but how might you steal data from those S3 buckets if you were an attacker? This blog post will explore some...
A Security Blog With A Focus On The Cloud
Our previous blog post discussed securing S3 buckets (you can find it here), but how might you steal data from those S3 buckets if you were an attacker? This blog post will explore some...
An AWS policy is a JSON document that defines a user role, or service’s permissions. AWS provides a bunch of pre-configured policies, otherwise known as AWS-managed policies. Alternatively, you can create your own, which...
What happens when IAM:PassRole is not configured correctly? A quick demo of an IAM:PassRole attack.