Sector Pages · Cloud Adversary

avatar

AWS Pivot Techniques: From SSRF to Cloud Administrator

Exploiting cloud misconfigurations is different than traditional networks. Tried my best to covers IMDSv2 bypasses, role assumption chains, and privilege escalation (PrivEsc!) through service integrations. AWS Pwnd! blog-post.

curl http://[::1]/