AWS Pentest Series Privilige Escalation over IAM (assumerole)In this part of the blog series we will examine the IAM privilige escalation by using assumerole. Before we start I want to give you some…Jun 20, 2023A response icon1Jun 20, 2023A response icon1
CLOUD AWS PENTEST SERIES IAM ENUMERATIONIAM (Identity and Access Management) is an essential aspect of securing your AWS (Amazon Web Services) infrastructure. It helps you control…Jun 13, 2023A response icon2Jun 13, 2023A response icon2
Cloud Walktrough Part 1Nowadays I have started learning and practicing the AWS pentesting issues. So I have already solved a challenge is called flaws.cloud and I…May 2, 2023May 2, 2023
MALICIOUS OFFICE DOCUMENT ANALYSISIn this blog post enrty I analayzed a malicious word document and I use deobfuscation and decoding methods for analysing malicious…Mar 29, 2021Mar 29, 2021
ANALYSIS TECHNIQUES FOR MALWARES WHICH USE HTTPSHello, in this blog post entry I write about malwares which uses https traffic for communication with c2 analysis techniques. We can use…Mar 25, 2021Mar 25, 2021