Introduction to container security - Part 1
Welcome to part 1 of my container security series! In this series we are going to focus on container security and skip compromising the service running in the container. You may ask yourself, why shou…
Welcome to part 1 of my container security series! In this series we are going to focus on container security and skip compromising the service running in the container. You may ask yourself, why shou…
Welcome back! Today it will be all about AWS Lambda! Get yourself a cup of coffee or a nice glass of wine and join me looking into privilege escalation attacks leveraging AWS Lambda. If you just jump…
Welcome back! Today's topic will be focusing on exploiting IAM permissions on other users, we'll dive into IAM-CreateAccessKey, IAM-CreateLoginProfile and IAM-UpdateLoginProfile. Don't be shy, feel f…
In the last article we set up IAMVulnerable and looked into the privilege escalation path through CreateNewPolicyVersion. Today we want to continue with privesc2 and privesc3 focusing on SetExistingDe…