AWS Pivot Techniques: From SSRF to Cloud Administrator
Exploiting cloud misconfigurations is different than traditional networks. Tried my best to covers IMDSv2 bypasses, role assumption chains, and privilege escalation (PrivEsc!) through service integrations. AWS Pwnd! blog-post.
curl http://[::1]/