AdanGetFederationToken: A Simple AWS Persistence Technique Used in the WildMy last two articles (how attackers can abuse IAM Roles Anywhere for persistent AWS access and gaining AWS persistence by updating a SAML…Dec 6
Rahul SoniA Beginner’s Guide to Amazon S3 📚: Storing 🗄️, Securing 🔒, and Scaling 📈 Your DataAmazon Simple Storage Service (S3) is a highly scalable, durable, and low-latency object storage service provided by AWS. It is designed to…Nov 29Nov 29
InAWS in Plain EnglishbypawelhaubusAWS Resource Control Policies (RCP) IntroductionOn the (lucky) 13th of November 2024, AWS introduced Resource Control Policies (RCPs).Nov 24Nov 24
AdanGetFederationToken: A Simple AWS Persistence Technique Used in the WildMy last two articles (how attackers can abuse IAM Roles Anywhere for persistent AWS access and gaining AWS persistence by updating a SAML…Dec 6
Rahul SoniA Beginner’s Guide to Amazon S3 📚: Storing 🗄️, Securing 🔒, and Scaling 📈 Your DataAmazon Simple Storage Service (S3) is a highly scalable, durable, and low-latency object storage service provided by AWS. It is designed to…Nov 29
InAWS in Plain EnglishbypawelhaubusAWS Resource Control Policies (RCP) IntroductionOn the (lucky) 13th of November 2024, AWS introduced Resource Control Policies (RCPs).Nov 24
Michael KirchnerWhat is the probability that you can successfully assume an IAM role in a random AWS account?Many resources on AWS can be configured to allow public access, using their resource-based policies. S3 buckets are a well-known example…Aug 151
InAWS in Plain EnglishbyRahul SoniAWS EC2: Everything you need to knowIn this article, I cover everything you need to know about EC2 in a simple and easy-to-understand language. I explain the basics, key…Nov 23
IBM PTC SecurityExploiting AWS Cognito MisconfigurationHi Readers! Before we get into the specifics of AWS congnito mis-configuration, we need to understand the concepts around aws coginito and…Aug 7