diff --git a/aws/exploitation/orphaned_cloudfront_or_dns_takeover_via_s3/index.html b/aws/exploitation/orphaned_cloudfront_or_dns_takeover_via_s3/index.html index b98f624d6..720499e34 100644 --- a/aws/exploitation/orphaned_cloudfront_or_dns_takeover_via_s3/index.html +++ b/aws/exploitation/orphaned_cloudfront_or_dns_takeover_via_s3/index.html @@ -7,13 +7,13 @@ .gdesc-inner { font-size: 0.75rem; } body[data-md-color-scheme="slate"] .gdesc-inner { background: var(--md-default-bg-color);} body[data-md-color-scheme="slate"] .gslide-title { color: var(--md-default-fg-color);} - body[data-md-color-scheme="slate"] .gslide-desc { color: var(--md-default-fg-color);}
Skip to content

Article by Houston Hopkins

DNS and CloudFront Domain Takeover via Deleted S3 Buckets

Utilizing various techniques for recon and enumeration, an attacker can discover orphaned Cloudfront distributions or DNS Records that are attempting to serve content from an S3 bucket that no longer exists. If an adversary finds one of these, they can create an S3 bucket in their own account and use it to serve malicious content. This content would then be distributed by the victim, and appear to be legitimate by an outside observer.

Note

Previously, calls to a CloudFront distribution backed by an S3 bucket that was deleted would result in a NoSuchBucket error. For example:

<Error>
+    body[data-md-color-scheme="slate"] .gslide-desc { color: var(--md-default-fg-color);}       

Article by Houston Hopkins

DNS and CloudFront Domain Takeover via Deleted S3 Buckets

Utilizing various techniques for recon and enumeration, an attacker can discover orphaned Cloudfront distributions or DNS Records that are attempting to serve content from an S3 bucket that no longer exists. If an adversary finds one of these, they can create an S3 bucket in their own account and use it to serve malicious content. This content would then be distributed by the victim, and appear to be legitimate by an outside observer.

Note

Previously, calls to a CloudFront distribution backed by an S3 bucket that was deleted would result in a NoSuchBucket error. For example:

<Error>
 <Code>NoSuchBucket</Code>
 <Message>The specified bucket does not exist</Message>
 <BucketName>hackingthe.cloud</BucketName>
 <RequestId>68M9C1KTARF9FBYN</RequestId>
 <HostId>RpbdvVU9AXidVVI/1zD+WTwYdVI5YMqQNJShmf6zJlztBVyINq8TtqbzWpThdi/LivlOWRVCPVs=</HostId>
 </Error>
-

This made it easy for attackers to identify the bucket name and quickly create their own to serve malicious content. As of late 2023, this behavior has been changed. Now CloudFront distributions pointing to deleted S3 buckets will return a NotFound error, and will not include the bucket name. This is a clear security improvement from AWS and makes it more difficult for an adversary to abuse.

If an adversary can enumerate the deleted bucket name through other means they can perform the attack as normal.

While there are a variety of ways in which this could be harmful, typically an adversary would serve JavaScript content that could be used to impact other parts of the domain. An adversary could use this to potentially steal browser cookies, perform actions as the user, and more.

Tip

Misconfigurations such as these are typically caused by poor hygiene in retiring cloud resources. Always be sure to delete DNS records first to potentially mitigate these issues. There are automated services out there that will automate the discovery of vulnerable domains/CloudFront distributions such as OWASP's domain-protect.

\ No newline at end of file diff --git a/aws/post_exploitation/survive_access_key_deletion_with_sts_getfederationtoken/index.html b/aws/post_exploitation/survive_access_key_deletion_with_sts_getfederationtoken/index.html index 769e46ae4..eca52b095 100644 --- a/aws/post_exploitation/survive_access_key_deletion_with_sts_getfederationtoken/index.html +++ b/aws/post_exploitation/survive_access_key_deletion_with_sts_getfederationtoken/index.html @@ -11,6 +11,6 @@ --name your_choice \ --policy-arns arn=arn:aws:iam::aws:policy/AdministratorAccess \ --duration-seconds 129600 -

Warning

While all 3 parameters are configurable by the attacker, keep in mind the potential for detection based on this. For instance, in a highly monitored environment, would the use of the AdministratorAccess policy raise suspicions? What about an extremely long lived session?

It is important to note that the provided policy-arns will use the intersection of the permissions that were passed. Meaning that if the user has no permissions, passing the AdministratorAccess policy will not provide it admin access to the account. This can, however, be helpful if you don't know what level of privilege you've compromised. By passing a highly privileged policy, you will ensure you will get the full access afforded to the identity.

Tip

In addition to passing a policy ARN, you can also pass an inline policy, which may be helpful to avoid suspicious use of certain policies.

For defenders, in addition to deactivating or deleting IAM user access keys, it may be worthwhile to attach a "DenyAll" policy to the compromised user. This would ensure that even if an adversary was using this technique, they would not be able to use their generated credentials.

It is also advisable to determine how common the use of sts:GetFederationToken is in your environments and alert on its use, or implement a Service Control Policy to prevent it.

\ No newline at end of file diff --git a/feed_json_updated.json b/feed_json_updated.json index 6a28adf1f..0d187e622 100644 --- a/feed_json_updated.json +++ b/feed_json_updated.json @@ -1 +1 @@ -{"version": "https://jsonfeed.org/version/1", "title": "Hacking The Cloud", "home_page_url": "https://hackingthe.cloud/", "feed_url": "https://hackingthe.cloud/feed_json_updated.json", "description": "The encyclopedia for offensive security in the cloud.", "icon": null, "authors": [], "language": "en", "items": [{"id": "https://hackingthe.cloud/azure/run-command-abuse/", "url": "https://hackingthe.cloud/azure/run-command-abuse/", "title": "Run Command Abuse", "content_html": "Utilise Azure RunCommands for execution and lateral movement.", "image": "https://hackingthe.cloud/assets/images/social/azure/run-command-abuse.png", "date_modified": "2024-10-05T05:04:44+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/exploiting_misconfigured_gitlab_oidc_aws_iam_roles/", "url": "https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/exploiting_misconfigured_gitlab_oidc_aws_iam_roles/", "title": "Exploiting Misconfigured GitLab OIDC AWS IAM Roles", "content_html": "Discover how to identify and exploit misconfigured AWS IAM roles using GitLab OIDC, with a detailed, step-by-step guide.", "image": "https://hackingthe.cloud/assets/images/social/aws/exploitation/Misconfigured_Resource-Based_Policies/exploiting_misconfigured_gitlab_oidc_aws_iam_roles.png", "date_modified": "2024-09-01T22:56:49+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/exploit_amplify_vulnerability_in_same_account_scenario/", "url": "https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/exploit_amplify_vulnerability_in_same_account_scenario/", "title": "CVE-2024-28056: Exploit an AWS Amplify Vulnerability in Same-Account Scenarios", "content_html": "An in-depth explanation of how to still abuse CVE-2024-28056, a vulnerability in AWS Amplify that exposed IAM roles to takeover.", "image": "https://hackingthe.cloud/assets/images/social/aws/exploitation/Misconfigured_Resource-Based_Policies/exploit_amplify_vulnerability_in_same_account_scenario.png", "date_modified": "2024-08-20T13:46:12+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/exploitation/lambda-steal-iam-credentials/", "url": "https://hackingthe.cloud/aws/exploitation/lambda-steal-iam-credentials/", "title": "Steal IAM Credentials and Event Data from Lambda", "content_html": "Leverage file read and SSRF vulnerabilities to steam IAM credentials and event data from Lambda.", "image": "https://hackingthe.cloud/assets/images/social/aws/exploitation/lambda-steal-iam-credentials.png", "date_modified": "2024-08-20T01:29:51+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/misconfigured_iam_role_trust_policy_wildcard_principal/", "url": "https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/misconfigured_iam_role_trust_policy_wildcard_principal/", "title": "Abusing Misconfigured Role Trust Policies with a Wildcard Principal", "content_html": "How to take advantage of misconfigured role trust policies that have wildcard principals.", "image": "https://hackingthe.cloud/assets/images/social/aws/exploitation/Misconfigured_Resource-Based_Policies/misconfigured_iam_role_trust_policy_wildcard_principal.png", "date_modified": "2024-08-04T21:24:46+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/general-knowledge/block-expensive-actions-with-scps/", "url": "https://hackingthe.cloud/aws/general-knowledge/block-expensive-actions-with-scps/", "title": "Prevent Expensive AWS API Actions with SCPs", "content_html": "Avoid AWS bill surprises by blocking known-expensive API calls with an SCP.", "image": "https://hackingthe.cloud/assets/images/social/aws/general-knowledge/block-expensive-actions-with-scps.png", "date_modified": "2024-07-30T15:11:00+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/gcp/enumeration/enumerate_all_permissions/", "url": "https://hackingthe.cloud/gcp/enumeration/enumerate_all_permissions/", "title": "Enumerate Org/Folder/Project Permissions + Individual Resource Permissions", "content_html": "Brute force the permissions of all resources above to see what permissions you have. Includes example of brute forcing ~9500 permissions at the end. Also introduces tool that passively collections permissions allowed as run (gcpwn)", "image": "https://hackingthe.cloud/assets/images/social/gcp/enumeration/enumerate_all_permissions.png", "date_modified": "2024-07-14T21:50:00+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/azure/abusing-managed-identities/", "url": "https://hackingthe.cloud/azure/abusing-managed-identities/", "title": "Abusing Managed Identities", "content_html": "Abusing Managed Identities", "image": "https://hackingthe.cloud/assets/images/social/azure/abusing-managed-identities.png", "date_modified": "2024-06-15T06:21:29+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/enumeration/discover_secrets_in_public_aims/", "url": "https://hackingthe.cloud/aws/enumeration/discover_secrets_in_public_aims/", "title": "Discover secrets in public AMIs", "content_html": "How to find public AMIs and get stored secrets.", "image": "https://hackingthe.cloud/assets/images/social/aws/enumeration/discover_secrets_in_public_aims.png", "date_modified": "2024-05-29T03:08:56+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/enumeration/enum_iam_user_role/", "url": "https://hackingthe.cloud/aws/enumeration/enum_iam_user_role/", "title": "Unauthenticated Enumeration of IAM Users and Roles", "content_html": "Discover how to exploit cross-account behaviors to enumerate IAM users and roles in another AWS account without authentication.", "image": "https://hackingthe.cloud/assets/images/social/aws/enumeration/enum_iam_user_role.png", "date_modified": "2024-05-28T14:52:34+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/enumeration/enumerate_root_email_from_console/", "url": "https://hackingthe.cloud/aws/enumeration/enumerate_root_email_from_console/", "title": "Enumerate Root User Email Address from the AWS Console", "content_html": "Identify if an email address belongs to the root user of an AWS account.", "image": "https://hackingthe.cloud/assets/images/social/aws/enumeration/enumerate_root_email_from_console.png", "date_modified": "2024-05-21T20:10:23+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/enumeration/account_id_from_s3_bucket/", "url": "https://hackingthe.cloud/aws/enumeration/account_id_from_s3_bucket/", "title": "Enumerate AWS Account ID from a Public S3 Bucket", "content_html": "Knowing only the name of a public S3 bucket, you can ascertain the account ID it resides in.", "image": "https://hackingthe.cloud/assets/images/social/aws/enumeration/account_id_from_s3_bucket.png", "date_modified": "2024-04-14T19:40:37+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/general-knowledge/aws_organizations_defaults/", "url": "https://hackingthe.cloud/aws/general-knowledge/aws_organizations_defaults/", "title": "AWS Organizations Defaults & Pivoting", "content_html": "How to abuse AWS Organizations' default behavior and lateral movement capabilities.", "image": "https://hackingthe.cloud/assets/images/social/aws/general-knowledge/aws_organizations_defaults.png", "date_modified": "2024-03-07T02:17:49+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/azure/anonymous-blob-access/", "url": "https://hackingthe.cloud/azure/anonymous-blob-access/", "title": "Anonymous Blob Access", "content_html": "Finding and accessing files stored in Azure Storage Accounts without authentication.", "image": "https://hackingthe.cloud/assets/images/social/azure/anonymous-blob-access.png", "date_modified": "2024-03-07T02:17:49+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/azure/soft-deleted-blobs/", "url": "https://hackingthe.cloud/azure/soft-deleted-blobs/", "title": "Soft Deleted Blobs", "content_html": "Recovering and accessing files in private Storage Accounts that have been deleted.", "image": "https://hackingthe.cloud/assets/images/social/azure/soft-deleted-blobs.png", "date_modified": "2024-03-07T02:17:49+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/", "url": "https://hackingthe.cloud/", "title": "Hacking The Cloud", "content_html": "The encyclopedia for offensive security in the cloud", "image": "https://hackingthe.cloud/assets/images/social/index.png", "date_modified": "2024-02-19T21:07:18+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/avoiding-detection/guardduty-pentest/", "url": "https://hackingthe.cloud/aws/avoiding-detection/guardduty-pentest/", "title": "Bypass GuardDuty Pentest Findings", "content_html": "Prevent Kali Linux, ParrotOS, and Pentoo Linux from throwing GuardDuty alerts by modifying the User Agent string.", "image": "https://hackingthe.cloud/assets/images/social/aws/avoiding-detection/guardduty-pentest.png", "date_modified": "2024-02-19T21:07:18+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/capture_the_flag/cicdont/", "url": "https://hackingthe.cloud/aws/capture_the_flag/cicdont/", "title": "CI/CDon't", "content_html": "An AWS/GitLab CICD themed CTF.", "image": "https://hackingthe.cloud/assets/images/social/aws/capture_the_flag/cicdont.png", "date_modified": "2024-02-19T21:07:18+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/deprecated/stealth_perm_enum/", "url": "https://hackingthe.cloud/aws/deprecated/stealth_perm_enum/", "title": "[Deprecated] Enumerate Permissions without Logging to CloudTrail", "content_html": "Leverage a bug in the AWS API to enumerate permissions for a role without logging to CloudTrail and alerting the Blue Team.", "image": "https://hackingthe.cloud/assets/images/social/aws/deprecated/stealth_perm_enum.png", "date_modified": "2024-02-19T21:07:18+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/enumeration/loot_public_ebs_snapshots/", "url": "https://hackingthe.cloud/aws/enumeration/loot_public_ebs_snapshots/", "title": "Loot Public EBS Snapshots", "content_html": "How to find and take advantage of exposed EBS snapshots.", "image": "https://hackingthe.cloud/assets/images/social/aws/enumeration/loot_public_ebs_snapshots.png", "date_modified": "2024-02-19T21:07:18+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/exploitation/abusing-container-registry/", "url": "https://hackingthe.cloud/aws/exploitation/abusing-container-registry/", "title": "Abusing Elastic Container Registry for Lateral Movement", "content_html": "With ECR permissions you can easily distribute a backdoor to production servers, developer's laptops, or CI/CD pipelines and own the environment by gaining privileged permissions.", "image": "https://hackingthe.cloud/assets/images/social/aws/exploitation/abusing-container-registry.png", "date_modified": "2024-02-19T21:07:18+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/exploitation/ec2-metadata-ssrf/", "url": "https://hackingthe.cloud/aws/exploitation/ec2-metadata-ssrf/", "title": "Steal EC2 Metadata Credentials via SSRF", "content_html": "Old faithful; How to steal IAM Role credentials from the EC2 Metadata service via SSRF.", "image": "https://hackingthe.cloud/assets/images/social/aws/exploitation/ec2-metadata-ssrf.png", "date_modified": "2024-02-19T21:07:18+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/exploitation/iam_privilege_escalation/", "url": "https://hackingthe.cloud/aws/exploitation/iam_privilege_escalation/", "title": "AWS IAM Privilege Escalation Techniques", "content_html": "Common techniques that can be leveraged to escalate privileges in an AWS account.", "image": "https://hackingthe.cloud/assets/images/social/aws/exploitation/iam_privilege_escalation.png", "date_modified": "2024-02-19T21:07:18+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/exploitation/s3-bucket-replication-exfiltration/", "url": "https://hackingthe.cloud/aws/exploitation/s3-bucket-replication-exfiltration/", "title": "Exfiltrating S3 Data with Bucket Replication Policies", "content_html": "Backdooring S3 buckets with Bucket Replication Policies.", "image": "https://hackingthe.cloud/assets/images/social/aws/exploitation/s3-bucket-replication-exfiltration.png", "date_modified": "2024-02-19T21:07:18+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/misconfigured_ecr_resource_policy/", "url": "https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/misconfigured_ecr_resource_policy/", "title": "Abusing Misconfigured ECR Resource Policies", "content_html": "How to take advantage of misconfigured AWS ECR private repositories.", "image": "https://hackingthe.cloud/assets/images/social/aws/exploitation/Misconfigured_Resource-Based_Policies/misconfigured_ecr_resource_policy.png", "date_modified": "2024-02-19T21:07:18+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/general-knowledge/connection-tracking/", "url": "https://hackingthe.cloud/aws/general-knowledge/connection-tracking/", "title": "Connection Tracking", "content_html": "Abuse security group connection tracking to maintain persistence even when security group rules are changed.", "image": "https://hackingthe.cloud/assets/images/social/aws/general-knowledge/connection-tracking.png", "date_modified": "2024-02-19T21:07:18+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/general-knowledge/using_stolen_iam_credentials/", "url": "https://hackingthe.cloud/aws/general-knowledge/using_stolen_iam_credentials/", "title": "Using Stolen IAM Credentials", "content_html": "How to work with stolen IAM credentials and things to consider.", "image": "https://hackingthe.cloud/assets/images/social/aws/general-knowledge/using_stolen_iam_credentials.png", "date_modified": "2024-02-19T21:07:18+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/post_exploitation/create_a_console_session_from_iam_credentials/", "url": "https://hackingthe.cloud/aws/post_exploitation/create_a_console_session_from_iam_credentials/", "title": "Create a Console Session from IAM Credentials", "content_html": "How to use IAM credentials to create an AWS Console session.", "image": "https://hackingthe.cloud/assets/images/social/aws/post_exploitation/create_a_console_session_from_iam_credentials.png", "date_modified": "2024-02-19T21:07:18+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/post_exploitation/intercept_ssm_communications/", "url": "https://hackingthe.cloud/aws/post_exploitation/intercept_ssm_communications/", "title": "Intercept SSM Communications", "content_html": "With access to an EC2 instance you can intercept, modify, and spoof SSM communications.", "image": "https://hackingthe.cloud/assets/images/social/aws/post_exploitation/intercept_ssm_communications.png", "date_modified": "2024-02-19T21:07:18+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/post_exploitation/lambda_persistence/", "url": "https://hackingthe.cloud/aws/post_exploitation/lambda_persistence/", "title": "Lambda Persistence", "content_html": "How to establish persistence on a Lambda function after getting remote code execution.", "image": "https://hackingthe.cloud/assets/images/social/aws/post_exploitation/lambda_persistence.png", "date_modified": "2024-02-19T21:07:18+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/post_exploitation/user_data_script_persistence/", "url": "https://hackingthe.cloud/aws/post_exploitation/user_data_script_persistence/", "title": "User Data Script Persistence", "content_html": "Maintain access to an EC2 instance and it's IAM role via user data scripts.", "image": "https://hackingthe.cloud/assets/images/social/aws/post_exploitation/user_data_script_persistence.png", "date_modified": "2024-02-19T21:07:18+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/blog/2022_wrap-up/", "url": "https://hackingthe.cloud/blog/2022_wrap-up/", "title": "2022 Wrap-up", "content_html": "An end of year summary for Hacking the Cloud in 2022.", "image": "https://hackingthe.cloud/assets/images/social/blog/2022_wrap-up.png", "date_modified": "2024-02-19T21:07:18+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/blog/2023_wrap-up/", "url": "https://hackingthe.cloud/blog/2023_wrap-up/", "title": "2023 Wrap-up", "content_html": "An end of year summary for Hacking the Cloud in 2023.", "image": "https://hackingthe.cloud/assets/images/social/blog/2023_wrap-up.png", "date_modified": "2024-02-19T21:07:18+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/blog/v2_new_look/", "url": "https://hackingthe.cloud/blog/v2_new_look/", "title": "Hacking The Cloud v2: New Look", "content_html": "All about the new look for Hacking The Cloud v2.", "image": "https://hackingthe.cloud/assets/images/social/blog/v2_new_look.png", "date_modified": "2024-02-19T21:07:18+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/terraform/terraform_ansi_escape_evasion/", "url": "https://hackingthe.cloud/terraform/terraform_ansi_escape_evasion/", "title": "Terraform ANSI Escape", "content_html": "Using ANSI Escape Sequences to Hide Malicious Terraform Code", "image": "https://hackingthe.cloud/assets/images/social/terraform/terraform_ansi_escape_evasion.png", "date_modified": "2024-02-19T21:07:18+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/terraform/terraform_enterprise_metadata_service/", "url": "https://hackingthe.cloud/terraform/terraform_enterprise_metadata_service/", "title": "Terraform Enterprise: Attack the Metadata Service", "content_html": "Leverage a default configuration in Terraform Enterprise to steal credentials from the Metadata Service", "image": "https://hackingthe.cloud/assets/images/social/terraform/terraform_enterprise_metadata_service.png", "date_modified": "2024-02-19T21:07:18+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/enumeration/enumerate_principal_arn_from_unique_id/", "url": "https://hackingthe.cloud/aws/enumeration/enumerate_principal_arn_from_unique_id/", "title": "Derive a Principal ARN from an AWS Unique Identifier", "content_html": "How to convert an unique identifier to a principal ARN.", "image": "https://hackingthe.cloud/assets/images/social/aws/enumeration/enumerate_principal_arn_from_unique_id.png", "date_modified": "2024-02-15T03:00:00+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/post_exploitation/get_iam_creds_from_console_session/", "url": "https://hackingthe.cloud/aws/post_exploitation/get_iam_creds_from_console_session/", "title": "Get IAM Credentials from a Console Session", "content_html": "Convert access to the AWS Console into IAM credentials.", "image": "https://hackingthe.cloud/assets/images/social/aws/post_exploitation/get_iam_creds_from_console_session.png", "date_modified": "2024-02-14T03:21:21+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/post_exploitation/role-chain-juggling/", "url": "https://hackingthe.cloud/aws/post_exploitation/role-chain-juggling/", "title": "Role Chain Juggling", "content_html": "Keep your access by chaining assume-role calls.", "image": "https://hackingthe.cloud/assets/images/social/aws/post_exploitation/role-chain-juggling.png", "date_modified": "2024-02-09T02:49:21+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/deprecated/whoami/", "url": "https://hackingthe.cloud/aws/deprecated/whoami/", "title": "[Deprecated] Whoami - Get Principal Name From Keys", "content_html": "During an assessment you may find AWS IAM credentials. Use these tactics to identify the principal of the keys.", "image": "https://hackingthe.cloud/assets/images/social/aws/deprecated/whoami.png", "date_modified": "2024-02-02T00:17:34+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/exploitation/local_ec2_priv_esc_through_user_data/", "url": "https://hackingthe.cloud/aws/exploitation/local_ec2_priv_esc_through_user_data/", "title": "EC2 Privilege Escalation Through User Data", "content_html": "How to escalate privileges on an EC2 instance by abusing user data.", "image": "https://hackingthe.cloud/assets/images/social/aws/exploitation/local_ec2_priv_esc_through_user_data.png", "date_modified": "2024-01-23T00:25:07+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/post_exploitation/iam_persistence/", "url": "https://hackingthe.cloud/aws/post_exploitation/iam_persistence/", "title": "AWS IAM Persistence Methods", "content_html": "A catalog of methods to maintain access to the AWS control plane.", "image": "https://hackingthe.cloud/assets/images/social/aws/post_exploitation/iam_persistence.png", "date_modified": "2024-01-21T17:34:08+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/post_exploitation/run_shell_commands_on_ec2/", "url": "https://hackingthe.cloud/aws/post_exploitation/run_shell_commands_on_ec2/", "title": "Run Shell Commands on EC2 with Send Command or Session Manager", "content_html": "Leverage privileged access in an AWS account to run arbitrary commands on an EC2 instance.", "image": "https://hackingthe.cloud/assets/images/social/aws/post_exploitation/run_shell_commands_on_ec2.png", "date_modified": "2024-01-21T17:27:28+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/avoiding-detection/modify-guardduty-config/", "url": "https://hackingthe.cloud/aws/avoiding-detection/modify-guardduty-config/", "title": "Modify GuardDuty Configuration", "content_html": "Modify existing GuardDuty configurations in the target account to hinder alerting and remediation capabilities.", "image": "https://hackingthe.cloud/assets/images/social/aws/avoiding-detection/modify-guardduty-config.png", "date_modified": "2024-01-21T17:20:20+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/exploitation/route53_modification_privilege_escalation/", "url": "https://hackingthe.cloud/aws/exploitation/route53_modification_privilege_escalation/", "title": "AWS API Call Hijacking via ACM-PCA", "content_html": "By modifying the route53 entries and utilizing the acm-pca private CA one can hijack the calls to AWS API inside the AWS VPC", "image": "https://hackingthe.cloud/assets/images/social/aws/exploitation/route53_modification_privilege_escalation.png", "date_modified": "2024-01-13T20:48:37+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/enumeration/get-account-id-from-keys/", "url": "https://hackingthe.cloud/aws/enumeration/get-account-id-from-keys/", "title": "Get Account ID from AWS Access Keys", "content_html": "Techniques to enumerate the account ID associated with an AWS access key.", "image": "https://hackingthe.cloud/assets/images/social/aws/enumeration/get-account-id-from-keys.png", "date_modified": "2024-01-13T01:04:53+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/", "url": "https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/", "title": "Misconfigured Resource-Based Policies", "content_html": "Common misconfigurations of resource-based policies and how they can be abused.", "image": "https://hackingthe.cloud/assets/images/social/aws/exploitation/Misconfigured_Resource-Based_Policies/index.png", "date_modified": "2024-01-11T08:57:50+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/enumeration/bypass_cognito_user_enumeration_controls/", "url": "https://hackingthe.cloud/aws/enumeration/bypass_cognito_user_enumeration_controls/", "title": "Bypass Cognito Account Enumeration Controls", "content_html": "Leverage a flaw in Cognito's API to enumerate accounts in User Pools.", "image": "https://hackingthe.cloud/assets/images/social/aws/enumeration/bypass_cognito_user_enumeration_controls.png", "date_modified": "2024-01-08T15:03:16+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/exploitation/cognito_user_self_signup/", "url": "https://hackingthe.cloud/aws/exploitation/cognito_user_self_signup/", "title": "Abusing Unintended Self-Signup in AWS Cognito", "content_html": "How to take advantage of misconfigured Amazon Cognito User Pools.", "image": "https://hackingthe.cloud/assets/images/social/aws/exploitation/cognito_user_self_signup.png", "date_modified": "2024-01-06T22:14:28+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/exploitation/cognito_identity_pool_excessive_privileges/", "url": "https://hackingthe.cloud/aws/exploitation/cognito_identity_pool_excessive_privileges/", "title": "Abusing Overpermissioned AWS Cognito Identity Pools", "content_html": "How to take advantage of misconfigured Amazon Cognito Identity Pools.", "image": "https://hackingthe.cloud/assets/images/social/aws/exploitation/cognito_identity_pool_excessive_privileges.png", "date_modified": "2024-01-06T20:43:40+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/general-knowledge/iam-key-identifiers/", "url": "https://hackingthe.cloud/aws/general-knowledge/iam-key-identifiers/", "title": "IAM unique identifiers", "content_html": "Chart of the IAM unique ID prefixes.", "image": "https://hackingthe.cloud/assets/images/social/aws/general-knowledge/iam-key-identifiers.png", "date_modified": "2024-01-04T04:45:39+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/exploitation/orphaned_cloudfront_or_dns_takeover_via_s3/", "url": "https://hackingthe.cloud/aws/exploitation/orphaned_cloudfront_or_dns_takeover_via_s3/", "title": "DNS and CloudFront Domain Takeover via Deleted S3 Buckets", "content_html": "How orphaned Route53 records and CloudFront distributions can be taken over if the backing S3 bucket is deleted.", "image": "https://hackingthe.cloud/assets/images/social/aws/exploitation/orphaned_cloudfront_or_dns_takeover_via_s3.png", "date_modified": "2023-12-26T20:35:31+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/exploitation/s3_server_access_logs/", "url": "https://hackingthe.cloud/aws/exploitation/s3_server_access_logs/", "title": "Data Exfiltration through S3 Server Access Logs", "content_html": "Exfiltrate data via S3:GetObject and S3 server access logs.", "image": "https://hackingthe.cloud/assets/images/social/aws/exploitation/s3_server_access_logs.png", "date_modified": "2023-12-08T02:37:35+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/enumeration/whoami/", "url": "https://hackingthe.cloud/aws/enumeration/whoami/", "title": "Whoami - Get Principal Name From Keys", "content_html": "During an assessment you may find AWS IAM credentials. Use these tactics to identify the principal of the keys.", "image": "https://hackingthe.cloud/assets/images/social/aws/enumeration/whoami.png", "date_modified": "2023-11-05T18:14:01+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/avoiding-detection/steal-keys-undetected/", "url": "https://hackingthe.cloud/aws/avoiding-detection/steal-keys-undetected/", "title": "Bypass Credential Exfiltration Detection", "content_html": "When stealing IAM credentials from an EC2 instance you can avoid a GuardDuty detection by using VPC Endpoints.", "image": "https://hackingthe.cloud/assets/images/social/aws/avoiding-detection/steal-keys-undetected.png", "date_modified": "2023-10-18T00:06:37+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/post_exploitation/survive_access_key_deletion_with_sts_getfederationtoken/", "url": "https://hackingthe.cloud/aws/post_exploitation/survive_access_key_deletion_with_sts_getfederationtoken/", "title": "Survive Access Key Deletion with sts:GetFederationToken", "content_html": "Use sts:GetFederationToken to maintain access, even if the original IAM credentials are revoked.", "image": "https://hackingthe.cloud/assets/images/social/aws/post_exploitation/survive_access_key_deletion_with_sts_getfederationtoken.png", "date_modified": "2023-09-25T13:24:44+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/post_exploitation/download_tools_and_exfiltrate_data_with_aws_cli/", "url": "https://hackingthe.cloud/aws/post_exploitation/download_tools_and_exfiltrate_data_with_aws_cli/", "title": "Download Tools and Exfiltrate Data with the AWS CLI", "content_html": "Using the AWS CLI as a LOLScript to download and exfiltrate data.", "image": "https://hackingthe.cloud/assets/images/social/aws/post_exploitation/download_tools_and_exfiltrate_data_with_aws_cli.png", "date_modified": "2023-07-15T15:12:33+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/azure/enum_email_addresses/", "url": "https://hackingthe.cloud/azure/enum_email_addresses/", "title": "Unauthenticated Enumeration of Azure Active Directory Email Addresses", "content_html": "Discover how to exploit information disclosure configurations in Azure Active Directory to enumerate valid email addresses.", "image": "https://hackingthe.cloud/assets/images/social/azure/enum_email_addresses.png", "date_modified": "2023-04-12T00:53:02+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/gcp/enumeration/enum_email_addresses/", "url": "https://hackingthe.cloud/gcp/enumeration/enum_email_addresses/", "title": "Unauthenticated Enumeration of Google Workspace Email Addresses", "content_html": "Discover how to exploit information disclosure configurations in Google Workspace to enumerate valid email addresses.", "image": "https://hackingthe.cloud/assets/images/social/gcp/enumeration/enum_email_addresses.png", "date_modified": "2023-04-12T00:53:02+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/exploitation/s3_streaming_copy/", "url": "https://hackingthe.cloud/aws/exploitation/s3_streaming_copy/", "title": "S3 Streaming Copy", "content_html": "Utilizng standard out to standard in with aws-cli utilizing multiple profiles to avoid logging and detection in a victim environment", "image": "https://hackingthe.cloud/assets/images/social/aws/exploitation/s3_streaming_copy.png", "date_modified": "2023-02-17T04:07:33+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/post_exploitation/s3_acl_persistence/", "url": "https://hackingthe.cloud/aws/post_exploitation/s3_acl_persistence/", "title": "S3 File ACL Persistence", "content_html": "Maintain access to S3 resources by configuring Access Control Lists associated with S3 Buckets or Objects.", "image": "https://hackingthe.cloud/assets/images/social/aws/post_exploitation/s3_acl_persistence.png", "date_modified": "2023-01-26T01:07:28+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/gcp/capture_the_flag/gcp-goat/", "url": "https://hackingthe.cloud/gcp/capture_the_flag/gcp-goat/", "title": "GCP Goat", "content_html": "GCP Goat is the Vulnerable application for learning the GCP Security", "image": "https://hackingthe.cloud/assets/images/social/gcp/capture_the_flag/gcp-goat.png", "date_modified": "2023-01-13T23:48:44+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/gcp/exploitation/gcp_iam_privilege_escalation/", "url": "https://hackingthe.cloud/gcp/exploitation/gcp_iam_privilege_escalation/", "title": "Privilege Escalation in Google Cloud Platform", "content_html": "Privilege escalation techniques for Google Cloud Platform (GCP)", "image": "https://hackingthe.cloud/assets/images/social/gcp/exploitation/gcp_iam_privilege_escalation.png", "date_modified": "2023-01-13T23:48:44+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/gcp/general-knowledge/gcp-buckets/", "url": "https://hackingthe.cloud/gcp/general-knowledge/gcp-buckets/", "title": "Hunting GCP Buckets", "content_html": "How to find valid and invalid GCP Buckets using tools", "image": "https://hackingthe.cloud/assets/images/social/gcp/general-knowledge/gcp-buckets.png", "date_modified": "2023-01-13T23:48:44+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/avoiding-detection/guardduty-tor-client/", "url": "https://hackingthe.cloud/aws/avoiding-detection/guardduty-tor-client/", "title": "Bypass GuardDuty Tor Client Findings", "content_html": "Connect to the Tor network from an EC2 instance without alerting GuardDuty.", "image": "https://hackingthe.cloud/assets/images/social/aws/avoiding-detection/guardduty-tor-client.png", "date_modified": "2023-01-09T03:01:49+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/enumeration/brute_force_iam_permissions/", "url": "https://hackingthe.cloud/aws/enumeration/brute_force_iam_permissions/", "title": "Brute Force IAM Permissions", "content_html": "Brute force the IAM permissions of a user or role to see what you have access to.", "image": "https://hackingthe.cloud/assets/images/social/aws/enumeration/brute_force_iam_permissions.png", "date_modified": "2022-12-28T18:47:24+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/enumeration/account_id_from_ec2/", "url": "https://hackingthe.cloud/aws/enumeration/account_id_from_ec2/", "title": "Enumerate AWS Account ID from an EC2 Instance", "content_html": "With access to an ec2 instance, you will be able to identify the AWS account it runs in.", "image": "https://hackingthe.cloud/assets/images/social/aws/enumeration/account_id_from_ec2.png", "date_modified": "2022-12-02T02:06:36+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/general-knowledge/intro_metadata_service/", "url": "https://hackingthe.cloud/aws/general-knowledge/intro_metadata_service/", "title": "Introduction to the Instance Metadata Service", "content_html": "An introduction to the Instance Metadata Service and how to access it.", "image": "https://hackingthe.cloud/assets/images/social/aws/general-knowledge/intro_metadata_service.png", "date_modified": "2022-12-02T02:06:36+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/general-knowledge/introduction_user_data/", "url": "https://hackingthe.cloud/aws/general-knowledge/introduction_user_data/", "title": "Introduction to User Data", "content_html": "An introduction to EC2 User Data and how to access it.", "image": "https://hackingthe.cloud/assets/images/social/aws/general-knowledge/introduction_user_data.png", "date_modified": "2022-12-02T02:06:36+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/gcp/capture_the_flag/thunder_ctf/", "url": "https://hackingthe.cloud/gcp/capture_the_flag/thunder_ctf/", "title": "Thunder CTF", "content_html": "GCP themed CTF", "image": "https://hackingthe.cloud/assets/images/social/gcp/capture_the_flag/thunder_ctf.png", "date_modified": "2022-12-02T02:06:36+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/gcp/enumeration/enumerate_service_account_permissions/", "url": "https://hackingthe.cloud/gcp/enumeration/enumerate_service_account_permissions/", "title": "Enumerate Service Account Permissions", "content_html": "Brute force the permissions of a service account to see what you have access to.", "image": "https://hackingthe.cloud/assets/images/social/gcp/enumeration/enumerate_service_account_permissions.png", "date_modified": "2022-12-02T02:06:36+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/gcp/general-knowledge/default-account-names/", "url": "https://hackingthe.cloud/gcp/general-knowledge/default-account-names/", "title": "Default Account Information", "content_html": "Default information on how accounts and service accounts exist in GCP", "image": "https://hackingthe.cloud/assets/images/social/gcp/general-knowledge/default-account-names.png", "date_modified": "2022-12-02T02:06:36+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/gcp/general-knowledge/metadata_in_google_cloud_instances/", "url": "https://hackingthe.cloud/gcp/general-knowledge/metadata_in_google_cloud_instances/", "title": "Metadata in Google Cloud Instances", "content_html": "Information about the data an attacker can access via GCP's API endpoints", "image": "https://hackingthe.cloud/assets/images/social/gcp/general-knowledge/metadata_in_google_cloud_instances.png", "date_modified": "2022-12-02T02:06:36+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/gcp/general-knowledge/security-and-constraints/", "url": "https://hackingthe.cloud/gcp/general-knowledge/security-and-constraints/", "title": "Security and Constraints", "content_html": "Security considerations and constraints that are unique to GCP", "image": "https://hackingthe.cloud/assets/images/social/gcp/general-knowledge/security-and-constraints.png", "date_modified": "2022-12-02T02:06:36+00:00", "authors": [], "tags": null}]} \ No newline at end of file +{"version": "https://jsonfeed.org/version/1", "title": "Hacking The Cloud", "home_page_url": "https://hackingthe.cloud/", "feed_url": "https://hackingthe.cloud/feed_json_updated.json", "description": "The encyclopedia for offensive security in the cloud.", "icon": null, "authors": [], "language": "en", "items": [{"id": "https://hackingthe.cloud/aws/exploitation/orphaned_cloudfront_or_dns_takeover_via_s3/", "url": "https://hackingthe.cloud/aws/exploitation/orphaned_cloudfront_or_dns_takeover_via_s3/", "title": "DNS and CloudFront Domain Takeover via Deleted S3 Buckets", "content_html": "How orphaned Route53 records and CloudFront distributions can be taken over if the backing S3 bucket is deleted.", "image": "https://hackingthe.cloud/assets/images/social/aws/exploitation/orphaned_cloudfront_or_dns_takeover_via_s3.png", "date_modified": "2024-10-30T21:58:21+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/azure/run-command-abuse/", "url": "https://hackingthe.cloud/azure/run-command-abuse/", "title": "Run Command Abuse", "content_html": "Utilise Azure RunCommands for execution and lateral movement.", "image": "https://hackingthe.cloud/assets/images/social/azure/run-command-abuse.png", "date_modified": "2024-10-05T05:04:44+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/exploiting_misconfigured_gitlab_oidc_aws_iam_roles/", "url": "https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/exploiting_misconfigured_gitlab_oidc_aws_iam_roles/", "title": "Exploiting Misconfigured GitLab OIDC AWS IAM Roles", "content_html": "Discover how to identify and exploit misconfigured AWS IAM roles using GitLab OIDC, with a detailed, step-by-step guide.", "image": "https://hackingthe.cloud/assets/images/social/aws/exploitation/Misconfigured_Resource-Based_Policies/exploiting_misconfigured_gitlab_oidc_aws_iam_roles.png", "date_modified": "2024-09-01T22:56:49+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/exploit_amplify_vulnerability_in_same_account_scenario/", "url": "https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/exploit_amplify_vulnerability_in_same_account_scenario/", "title": "CVE-2024-28056: Exploit an AWS Amplify Vulnerability in Same-Account Scenarios", "content_html": "An in-depth explanation of how to still abuse CVE-2024-28056, a vulnerability in AWS Amplify that exposed IAM roles to takeover.", "image": "https://hackingthe.cloud/assets/images/social/aws/exploitation/Misconfigured_Resource-Based_Policies/exploit_amplify_vulnerability_in_same_account_scenario.png", "date_modified": "2024-08-20T13:46:12+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/exploitation/lambda-steal-iam-credentials/", "url": "https://hackingthe.cloud/aws/exploitation/lambda-steal-iam-credentials/", "title": "Steal IAM Credentials and Event Data from Lambda", "content_html": "Leverage file read and SSRF vulnerabilities to steam IAM credentials and event data from Lambda.", "image": "https://hackingthe.cloud/assets/images/social/aws/exploitation/lambda-steal-iam-credentials.png", "date_modified": "2024-08-20T01:29:51+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/misconfigured_iam_role_trust_policy_wildcard_principal/", "url": "https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/misconfigured_iam_role_trust_policy_wildcard_principal/", "title": "Abusing Misconfigured Role Trust Policies with a Wildcard Principal", "content_html": "How to take advantage of misconfigured role trust policies that have wildcard principals.", "image": "https://hackingthe.cloud/assets/images/social/aws/exploitation/Misconfigured_Resource-Based_Policies/misconfigured_iam_role_trust_policy_wildcard_principal.png", "date_modified": "2024-08-04T21:24:46+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/general-knowledge/block-expensive-actions-with-scps/", "url": "https://hackingthe.cloud/aws/general-knowledge/block-expensive-actions-with-scps/", "title": "Prevent Expensive AWS API Actions with SCPs", "content_html": "Avoid AWS bill surprises by blocking known-expensive API calls with an SCP.", "image": "https://hackingthe.cloud/assets/images/social/aws/general-knowledge/block-expensive-actions-with-scps.png", "date_modified": "2024-07-30T15:11:00+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/gcp/enumeration/enumerate_all_permissions/", "url": "https://hackingthe.cloud/gcp/enumeration/enumerate_all_permissions/", "title": "Enumerate Org/Folder/Project Permissions + Individual Resource Permissions", "content_html": "Brute force the permissions of all resources above to see what permissions you have. Includes example of brute forcing ~9500 permissions at the end. Also introduces tool that passively collections permissions allowed as run (gcpwn)", "image": "https://hackingthe.cloud/assets/images/social/gcp/enumeration/enumerate_all_permissions.png", "date_modified": "2024-07-14T21:50:00+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/azure/abusing-managed-identities/", "url": "https://hackingthe.cloud/azure/abusing-managed-identities/", "title": "Abusing Managed Identities", "content_html": "Abusing Managed Identities", "image": "https://hackingthe.cloud/assets/images/social/azure/abusing-managed-identities.png", "date_modified": "2024-06-15T06:21:29+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/enumeration/discover_secrets_in_public_aims/", "url": "https://hackingthe.cloud/aws/enumeration/discover_secrets_in_public_aims/", "title": "Discover secrets in public AMIs", "content_html": "How to find public AMIs and get stored secrets.", "image": "https://hackingthe.cloud/assets/images/social/aws/enumeration/discover_secrets_in_public_aims.png", "date_modified": "2024-05-29T03:08:56+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/enumeration/enum_iam_user_role/", "url": "https://hackingthe.cloud/aws/enumeration/enum_iam_user_role/", "title": "Unauthenticated Enumeration of IAM Users and Roles", "content_html": "Discover how to exploit cross-account behaviors to enumerate IAM users and roles in another AWS account without authentication.", "image": "https://hackingthe.cloud/assets/images/social/aws/enumeration/enum_iam_user_role.png", "date_modified": "2024-05-28T14:52:34+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/enumeration/enumerate_root_email_from_console/", "url": "https://hackingthe.cloud/aws/enumeration/enumerate_root_email_from_console/", "title": "Enumerate Root User Email Address from the AWS Console", "content_html": "Identify if an email address belongs to the root user of an AWS account.", "image": "https://hackingthe.cloud/assets/images/social/aws/enumeration/enumerate_root_email_from_console.png", "date_modified": "2024-05-21T20:10:23+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/enumeration/account_id_from_s3_bucket/", "url": "https://hackingthe.cloud/aws/enumeration/account_id_from_s3_bucket/", "title": "Enumerate AWS Account ID from a Public S3 Bucket", "content_html": "Knowing only the name of a public S3 bucket, you can ascertain the account ID it resides in.", "image": "https://hackingthe.cloud/assets/images/social/aws/enumeration/account_id_from_s3_bucket.png", "date_modified": "2024-04-14T19:40:37+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/general-knowledge/aws_organizations_defaults/", "url": "https://hackingthe.cloud/aws/general-knowledge/aws_organizations_defaults/", "title": "AWS Organizations Defaults & Pivoting", "content_html": "How to abuse AWS Organizations' default behavior and lateral movement capabilities.", "image": "https://hackingthe.cloud/assets/images/social/aws/general-knowledge/aws_organizations_defaults.png", "date_modified": "2024-03-07T02:17:49+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/azure/anonymous-blob-access/", "url": "https://hackingthe.cloud/azure/anonymous-blob-access/", "title": "Anonymous Blob Access", "content_html": "Finding and accessing files stored in Azure Storage Accounts without authentication.", "image": "https://hackingthe.cloud/assets/images/social/azure/anonymous-blob-access.png", "date_modified": "2024-03-07T02:17:49+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/azure/soft-deleted-blobs/", "url": "https://hackingthe.cloud/azure/soft-deleted-blobs/", "title": "Soft Deleted Blobs", "content_html": "Recovering and accessing files in private Storage Accounts that have been deleted.", "image": "https://hackingthe.cloud/assets/images/social/azure/soft-deleted-blobs.png", "date_modified": "2024-03-07T02:17:49+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/", "url": "https://hackingthe.cloud/", "title": "Hacking The Cloud", "content_html": "The encyclopedia for offensive security in the cloud", "image": "https://hackingthe.cloud/assets/images/social/index.png", "date_modified": "2024-02-19T21:07:18+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/avoiding-detection/guardduty-pentest/", "url": "https://hackingthe.cloud/aws/avoiding-detection/guardduty-pentest/", "title": "Bypass GuardDuty Pentest Findings", "content_html": "Prevent Kali Linux, ParrotOS, and Pentoo Linux from throwing GuardDuty alerts by modifying the User Agent string.", "image": "https://hackingthe.cloud/assets/images/social/aws/avoiding-detection/guardduty-pentest.png", "date_modified": "2024-02-19T21:07:18+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/capture_the_flag/cicdont/", "url": "https://hackingthe.cloud/aws/capture_the_flag/cicdont/", "title": "CI/CDon't", "content_html": "An AWS/GitLab CICD themed CTF.", "image": "https://hackingthe.cloud/assets/images/social/aws/capture_the_flag/cicdont.png", "date_modified": "2024-02-19T21:07:18+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/deprecated/stealth_perm_enum/", "url": "https://hackingthe.cloud/aws/deprecated/stealth_perm_enum/", "title": "[Deprecated] Enumerate Permissions without Logging to CloudTrail", "content_html": "Leverage a bug in the AWS API to enumerate permissions for a role without logging to CloudTrail and alerting the Blue Team.", "image": "https://hackingthe.cloud/assets/images/social/aws/deprecated/stealth_perm_enum.png", "date_modified": "2024-02-19T21:07:18+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/enumeration/loot_public_ebs_snapshots/", "url": "https://hackingthe.cloud/aws/enumeration/loot_public_ebs_snapshots/", "title": "Loot Public EBS Snapshots", "content_html": "How to find and take advantage of exposed EBS snapshots.", "image": "https://hackingthe.cloud/assets/images/social/aws/enumeration/loot_public_ebs_snapshots.png", "date_modified": "2024-02-19T21:07:18+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/exploitation/abusing-container-registry/", "url": "https://hackingthe.cloud/aws/exploitation/abusing-container-registry/", "title": "Abusing Elastic Container Registry for Lateral Movement", "content_html": "With ECR permissions you can easily distribute a backdoor to production servers, developer's laptops, or CI/CD pipelines and own the environment by gaining privileged permissions.", "image": "https://hackingthe.cloud/assets/images/social/aws/exploitation/abusing-container-registry.png", "date_modified": "2024-02-19T21:07:18+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/exploitation/ec2-metadata-ssrf/", "url": "https://hackingthe.cloud/aws/exploitation/ec2-metadata-ssrf/", "title": "Steal EC2 Metadata Credentials via SSRF", "content_html": "Old faithful; How to steal IAM Role credentials from the EC2 Metadata service via SSRF.", "image": "https://hackingthe.cloud/assets/images/social/aws/exploitation/ec2-metadata-ssrf.png", "date_modified": "2024-02-19T21:07:18+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/exploitation/iam_privilege_escalation/", "url": "https://hackingthe.cloud/aws/exploitation/iam_privilege_escalation/", "title": "AWS IAM Privilege Escalation Techniques", "content_html": "Common techniques that can be leveraged to escalate privileges in an AWS account.", "image": "https://hackingthe.cloud/assets/images/social/aws/exploitation/iam_privilege_escalation.png", "date_modified": "2024-02-19T21:07:18+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/exploitation/s3-bucket-replication-exfiltration/", "url": "https://hackingthe.cloud/aws/exploitation/s3-bucket-replication-exfiltration/", "title": "Exfiltrating S3 Data with Bucket Replication Policies", "content_html": "Backdooring S3 buckets with Bucket Replication Policies.", "image": "https://hackingthe.cloud/assets/images/social/aws/exploitation/s3-bucket-replication-exfiltration.png", "date_modified": "2024-02-19T21:07:18+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/misconfigured_ecr_resource_policy/", "url": "https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/misconfigured_ecr_resource_policy/", "title": "Abusing Misconfigured ECR Resource Policies", "content_html": "How to take advantage of misconfigured AWS ECR private repositories.", "image": "https://hackingthe.cloud/assets/images/social/aws/exploitation/Misconfigured_Resource-Based_Policies/misconfigured_ecr_resource_policy.png", "date_modified": "2024-02-19T21:07:18+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/general-knowledge/connection-tracking/", "url": "https://hackingthe.cloud/aws/general-knowledge/connection-tracking/", "title": "Connection Tracking", "content_html": "Abuse security group connection tracking to maintain persistence even when security group rules are changed.", "image": "https://hackingthe.cloud/assets/images/social/aws/general-knowledge/connection-tracking.png", "date_modified": "2024-02-19T21:07:18+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/general-knowledge/using_stolen_iam_credentials/", "url": "https://hackingthe.cloud/aws/general-knowledge/using_stolen_iam_credentials/", "title": "Using Stolen IAM Credentials", "content_html": "How to work with stolen IAM credentials and things to consider.", "image": "https://hackingthe.cloud/assets/images/social/aws/general-knowledge/using_stolen_iam_credentials.png", "date_modified": "2024-02-19T21:07:18+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/post_exploitation/create_a_console_session_from_iam_credentials/", "url": "https://hackingthe.cloud/aws/post_exploitation/create_a_console_session_from_iam_credentials/", "title": "Create a Console Session from IAM Credentials", "content_html": "How to use IAM credentials to create an AWS Console session.", "image": "https://hackingthe.cloud/assets/images/social/aws/post_exploitation/create_a_console_session_from_iam_credentials.png", "date_modified": "2024-02-19T21:07:18+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/post_exploitation/intercept_ssm_communications/", "url": "https://hackingthe.cloud/aws/post_exploitation/intercept_ssm_communications/", "title": "Intercept SSM Communications", "content_html": "With access to an EC2 instance you can intercept, modify, and spoof SSM communications.", "image": "https://hackingthe.cloud/assets/images/social/aws/post_exploitation/intercept_ssm_communications.png", "date_modified": "2024-02-19T21:07:18+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/post_exploitation/lambda_persistence/", "url": "https://hackingthe.cloud/aws/post_exploitation/lambda_persistence/", "title": "Lambda Persistence", "content_html": "How to establish persistence on a Lambda function after getting remote code execution.", "image": "https://hackingthe.cloud/assets/images/social/aws/post_exploitation/lambda_persistence.png", "date_modified": "2024-02-19T21:07:18+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/post_exploitation/user_data_script_persistence/", "url": "https://hackingthe.cloud/aws/post_exploitation/user_data_script_persistence/", "title": "User Data Script Persistence", "content_html": "Maintain access to an EC2 instance and it's IAM role via user data scripts.", "image": "https://hackingthe.cloud/assets/images/social/aws/post_exploitation/user_data_script_persistence.png", "date_modified": "2024-02-19T21:07:18+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/blog/2022_wrap-up/", "url": "https://hackingthe.cloud/blog/2022_wrap-up/", "title": "2022 Wrap-up", "content_html": "An end of year summary for Hacking the Cloud in 2022.", "image": "https://hackingthe.cloud/assets/images/social/blog/2022_wrap-up.png", "date_modified": "2024-02-19T21:07:18+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/blog/2023_wrap-up/", "url": "https://hackingthe.cloud/blog/2023_wrap-up/", "title": "2023 Wrap-up", "content_html": "An end of year summary for Hacking the Cloud in 2023.", "image": "https://hackingthe.cloud/assets/images/social/blog/2023_wrap-up.png", "date_modified": "2024-02-19T21:07:18+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/blog/v2_new_look/", "url": "https://hackingthe.cloud/blog/v2_new_look/", "title": "Hacking The Cloud v2: New Look", "content_html": "All about the new look for Hacking The Cloud v2.", "image": "https://hackingthe.cloud/assets/images/social/blog/v2_new_look.png", "date_modified": "2024-02-19T21:07:18+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/terraform/terraform_ansi_escape_evasion/", "url": "https://hackingthe.cloud/terraform/terraform_ansi_escape_evasion/", "title": "Terraform ANSI Escape", "content_html": "Using ANSI Escape Sequences to Hide Malicious Terraform Code", "image": "https://hackingthe.cloud/assets/images/social/terraform/terraform_ansi_escape_evasion.png", "date_modified": "2024-02-19T21:07:18+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/terraform/terraform_enterprise_metadata_service/", "url": "https://hackingthe.cloud/terraform/terraform_enterprise_metadata_service/", "title": "Terraform Enterprise: Attack the Metadata Service", "content_html": "Leverage a default configuration in Terraform Enterprise to steal credentials from the Metadata Service", "image": "https://hackingthe.cloud/assets/images/social/terraform/terraform_enterprise_metadata_service.png", "date_modified": "2024-02-19T21:07:18+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/enumeration/enumerate_principal_arn_from_unique_id/", "url": "https://hackingthe.cloud/aws/enumeration/enumerate_principal_arn_from_unique_id/", "title": "Derive a Principal ARN from an AWS Unique Identifier", "content_html": "How to convert an unique identifier to a principal ARN.", "image": "https://hackingthe.cloud/assets/images/social/aws/enumeration/enumerate_principal_arn_from_unique_id.png", "date_modified": "2024-02-15T03:00:00+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/post_exploitation/get_iam_creds_from_console_session/", "url": "https://hackingthe.cloud/aws/post_exploitation/get_iam_creds_from_console_session/", "title": "Get IAM Credentials from a Console Session", "content_html": "Convert access to the AWS Console into IAM credentials.", "image": "https://hackingthe.cloud/assets/images/social/aws/post_exploitation/get_iam_creds_from_console_session.png", "date_modified": "2024-02-14T03:21:21+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/post_exploitation/role-chain-juggling/", "url": "https://hackingthe.cloud/aws/post_exploitation/role-chain-juggling/", "title": "Role Chain Juggling", "content_html": "Keep your access by chaining assume-role calls.", "image": "https://hackingthe.cloud/assets/images/social/aws/post_exploitation/role-chain-juggling.png", "date_modified": "2024-02-09T02:49:21+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/deprecated/whoami/", "url": "https://hackingthe.cloud/aws/deprecated/whoami/", "title": "[Deprecated] Whoami - Get Principal Name From Keys", "content_html": "During an assessment you may find AWS IAM credentials. Use these tactics to identify the principal of the keys.", "image": "https://hackingthe.cloud/assets/images/social/aws/deprecated/whoami.png", "date_modified": "2024-02-02T00:17:34+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/exploitation/local_ec2_priv_esc_through_user_data/", "url": "https://hackingthe.cloud/aws/exploitation/local_ec2_priv_esc_through_user_data/", "title": "EC2 Privilege Escalation Through User Data", "content_html": "How to escalate privileges on an EC2 instance by abusing user data.", "image": "https://hackingthe.cloud/assets/images/social/aws/exploitation/local_ec2_priv_esc_through_user_data.png", "date_modified": "2024-01-23T00:25:07+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/post_exploitation/iam_persistence/", "url": "https://hackingthe.cloud/aws/post_exploitation/iam_persistence/", "title": "AWS IAM Persistence Methods", "content_html": "A catalog of methods to maintain access to the AWS control plane.", "image": "https://hackingthe.cloud/assets/images/social/aws/post_exploitation/iam_persistence.png", "date_modified": "2024-01-21T17:34:08+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/post_exploitation/run_shell_commands_on_ec2/", "url": "https://hackingthe.cloud/aws/post_exploitation/run_shell_commands_on_ec2/", "title": "Run Shell Commands on EC2 with Send Command or Session Manager", "content_html": "Leverage privileged access in an AWS account to run arbitrary commands on an EC2 instance.", "image": "https://hackingthe.cloud/assets/images/social/aws/post_exploitation/run_shell_commands_on_ec2.png", "date_modified": "2024-01-21T17:27:28+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/avoiding-detection/modify-guardduty-config/", "url": "https://hackingthe.cloud/aws/avoiding-detection/modify-guardduty-config/", "title": "Modify GuardDuty Configuration", "content_html": "Modify existing GuardDuty configurations in the target account to hinder alerting and remediation capabilities.", "image": "https://hackingthe.cloud/assets/images/social/aws/avoiding-detection/modify-guardduty-config.png", "date_modified": "2024-01-21T17:20:20+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/exploitation/route53_modification_privilege_escalation/", "url": "https://hackingthe.cloud/aws/exploitation/route53_modification_privilege_escalation/", "title": "AWS API Call Hijacking via ACM-PCA", "content_html": "By modifying the route53 entries and utilizing the acm-pca private CA one can hijack the calls to AWS API inside the AWS VPC", "image": "https://hackingthe.cloud/assets/images/social/aws/exploitation/route53_modification_privilege_escalation.png", "date_modified": "2024-01-13T20:48:37+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/enumeration/get-account-id-from-keys/", "url": "https://hackingthe.cloud/aws/enumeration/get-account-id-from-keys/", "title": "Get Account ID from AWS Access Keys", "content_html": "Techniques to enumerate the account ID associated with an AWS access key.", "image": "https://hackingthe.cloud/assets/images/social/aws/enumeration/get-account-id-from-keys.png", "date_modified": "2024-01-13T01:04:53+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/", "url": "https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/", "title": "Misconfigured Resource-Based Policies", "content_html": "Common misconfigurations of resource-based policies and how they can be abused.", "image": "https://hackingthe.cloud/assets/images/social/aws/exploitation/Misconfigured_Resource-Based_Policies/index.png", "date_modified": "2024-01-11T08:57:50+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/enumeration/bypass_cognito_user_enumeration_controls/", "url": "https://hackingthe.cloud/aws/enumeration/bypass_cognito_user_enumeration_controls/", "title": "Bypass Cognito Account Enumeration Controls", "content_html": "Leverage a flaw in Cognito's API to enumerate accounts in User Pools.", "image": "https://hackingthe.cloud/assets/images/social/aws/enumeration/bypass_cognito_user_enumeration_controls.png", "date_modified": "2024-01-08T15:03:16+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/exploitation/cognito_user_self_signup/", "url": "https://hackingthe.cloud/aws/exploitation/cognito_user_self_signup/", "title": "Abusing Unintended Self-Signup in AWS Cognito", "content_html": "How to take advantage of misconfigured Amazon Cognito User Pools.", "image": "https://hackingthe.cloud/assets/images/social/aws/exploitation/cognito_user_self_signup.png", "date_modified": "2024-01-06T22:14:28+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/exploitation/cognito_identity_pool_excessive_privileges/", "url": "https://hackingthe.cloud/aws/exploitation/cognito_identity_pool_excessive_privileges/", "title": "Abusing Overpermissioned AWS Cognito Identity Pools", "content_html": "How to take advantage of misconfigured Amazon Cognito Identity Pools.", "image": "https://hackingthe.cloud/assets/images/social/aws/exploitation/cognito_identity_pool_excessive_privileges.png", "date_modified": "2024-01-06T20:43:40+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/general-knowledge/iam-key-identifiers/", "url": "https://hackingthe.cloud/aws/general-knowledge/iam-key-identifiers/", "title": "IAM unique identifiers", "content_html": "Chart of the IAM unique ID prefixes.", "image": "https://hackingthe.cloud/assets/images/social/aws/general-knowledge/iam-key-identifiers.png", "date_modified": "2024-01-04T04:45:39+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/exploitation/s3_server_access_logs/", "url": "https://hackingthe.cloud/aws/exploitation/s3_server_access_logs/", "title": "Data Exfiltration through S3 Server Access Logs", "content_html": "Exfiltrate data via S3:GetObject and S3 server access logs.", "image": "https://hackingthe.cloud/assets/images/social/aws/exploitation/s3_server_access_logs.png", "date_modified": "2023-12-08T02:37:35+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/enumeration/whoami/", "url": "https://hackingthe.cloud/aws/enumeration/whoami/", "title": "Whoami - Get Principal Name From Keys", "content_html": "During an assessment you may find AWS IAM credentials. Use these tactics to identify the principal of the keys.", "image": "https://hackingthe.cloud/assets/images/social/aws/enumeration/whoami.png", "date_modified": "2023-11-05T18:14:01+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/avoiding-detection/steal-keys-undetected/", "url": "https://hackingthe.cloud/aws/avoiding-detection/steal-keys-undetected/", "title": "Bypass Credential Exfiltration Detection", "content_html": "When stealing IAM credentials from an EC2 instance you can avoid a GuardDuty detection by using VPC Endpoints.", "image": "https://hackingthe.cloud/assets/images/social/aws/avoiding-detection/steal-keys-undetected.png", "date_modified": "2023-10-18T00:06:37+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/post_exploitation/survive_access_key_deletion_with_sts_getfederationtoken/", "url": "https://hackingthe.cloud/aws/post_exploitation/survive_access_key_deletion_with_sts_getfederationtoken/", "title": "Survive Access Key Deletion with sts:GetFederationToken", "content_html": "Use sts:GetFederationToken to maintain access, even if the original IAM credentials are revoked.", "image": "https://hackingthe.cloud/assets/images/social/aws/post_exploitation/survive_access_key_deletion_with_sts_getfederationtoken.png", "date_modified": "2023-09-25T13:24:44+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/post_exploitation/download_tools_and_exfiltrate_data_with_aws_cli/", "url": "https://hackingthe.cloud/aws/post_exploitation/download_tools_and_exfiltrate_data_with_aws_cli/", "title": "Download Tools and Exfiltrate Data with the AWS CLI", "content_html": "Using the AWS CLI as a LOLScript to download and exfiltrate data.", "image": "https://hackingthe.cloud/assets/images/social/aws/post_exploitation/download_tools_and_exfiltrate_data_with_aws_cli.png", "date_modified": "2023-07-15T15:12:33+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/azure/enum_email_addresses/", "url": "https://hackingthe.cloud/azure/enum_email_addresses/", "title": "Unauthenticated Enumeration of Azure Active Directory Email Addresses", "content_html": "Discover how to exploit information disclosure configurations in Azure Active Directory to enumerate valid email addresses.", "image": "https://hackingthe.cloud/assets/images/social/azure/enum_email_addresses.png", "date_modified": "2023-04-12T00:53:02+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/gcp/enumeration/enum_email_addresses/", "url": "https://hackingthe.cloud/gcp/enumeration/enum_email_addresses/", "title": "Unauthenticated Enumeration of Google Workspace Email Addresses", "content_html": "Discover how to exploit information disclosure configurations in Google Workspace to enumerate valid email addresses.", "image": "https://hackingthe.cloud/assets/images/social/gcp/enumeration/enum_email_addresses.png", "date_modified": "2023-04-12T00:53:02+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/exploitation/s3_streaming_copy/", "url": "https://hackingthe.cloud/aws/exploitation/s3_streaming_copy/", "title": "S3 Streaming Copy", "content_html": "Utilizng standard out to standard in with aws-cli utilizing multiple profiles to avoid logging and detection in a victim environment", "image": "https://hackingthe.cloud/assets/images/social/aws/exploitation/s3_streaming_copy.png", "date_modified": "2023-02-17T04:07:33+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/post_exploitation/s3_acl_persistence/", "url": "https://hackingthe.cloud/aws/post_exploitation/s3_acl_persistence/", "title": "S3 File ACL Persistence", "content_html": "Maintain access to S3 resources by configuring Access Control Lists associated with S3 Buckets or Objects.", "image": "https://hackingthe.cloud/assets/images/social/aws/post_exploitation/s3_acl_persistence.png", "date_modified": "2023-01-26T01:07:28+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/gcp/capture_the_flag/gcp-goat/", "url": "https://hackingthe.cloud/gcp/capture_the_flag/gcp-goat/", "title": "GCP Goat", "content_html": "GCP Goat is the Vulnerable application for learning the GCP Security", "image": "https://hackingthe.cloud/assets/images/social/gcp/capture_the_flag/gcp-goat.png", "date_modified": "2023-01-13T23:48:44+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/gcp/exploitation/gcp_iam_privilege_escalation/", "url": "https://hackingthe.cloud/gcp/exploitation/gcp_iam_privilege_escalation/", "title": "Privilege Escalation in Google Cloud Platform", "content_html": "Privilege escalation techniques for Google Cloud Platform (GCP)", "image": "https://hackingthe.cloud/assets/images/social/gcp/exploitation/gcp_iam_privilege_escalation.png", "date_modified": "2023-01-13T23:48:44+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/gcp/general-knowledge/gcp-buckets/", "url": "https://hackingthe.cloud/gcp/general-knowledge/gcp-buckets/", "title": "Hunting GCP Buckets", "content_html": "How to find valid and invalid GCP Buckets using tools", "image": "https://hackingthe.cloud/assets/images/social/gcp/general-knowledge/gcp-buckets.png", "date_modified": "2023-01-13T23:48:44+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/avoiding-detection/guardduty-tor-client/", "url": "https://hackingthe.cloud/aws/avoiding-detection/guardduty-tor-client/", "title": "Bypass GuardDuty Tor Client Findings", "content_html": "Connect to the Tor network from an EC2 instance without alerting GuardDuty.", "image": "https://hackingthe.cloud/assets/images/social/aws/avoiding-detection/guardduty-tor-client.png", "date_modified": "2023-01-09T03:01:49+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/enumeration/brute_force_iam_permissions/", "url": "https://hackingthe.cloud/aws/enumeration/brute_force_iam_permissions/", "title": "Brute Force IAM Permissions", "content_html": "Brute force the IAM permissions of a user or role to see what you have access to.", "image": "https://hackingthe.cloud/assets/images/social/aws/enumeration/brute_force_iam_permissions.png", "date_modified": "2022-12-28T18:47:24+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/enumeration/account_id_from_ec2/", "url": "https://hackingthe.cloud/aws/enumeration/account_id_from_ec2/", "title": "Enumerate AWS Account ID from an EC2 Instance", "content_html": "With access to an ec2 instance, you will be able to identify the AWS account it runs in.", "image": "https://hackingthe.cloud/assets/images/social/aws/enumeration/account_id_from_ec2.png", "date_modified": "2022-12-02T02:06:36+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/general-knowledge/intro_metadata_service/", "url": "https://hackingthe.cloud/aws/general-knowledge/intro_metadata_service/", "title": "Introduction to the Instance Metadata Service", "content_html": "An introduction to the Instance Metadata Service and how to access it.", "image": "https://hackingthe.cloud/assets/images/social/aws/general-knowledge/intro_metadata_service.png", "date_modified": "2022-12-02T02:06:36+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/aws/general-knowledge/introduction_user_data/", "url": "https://hackingthe.cloud/aws/general-knowledge/introduction_user_data/", "title": "Introduction to User Data", "content_html": "An introduction to EC2 User Data and how to access it.", "image": "https://hackingthe.cloud/assets/images/social/aws/general-knowledge/introduction_user_data.png", "date_modified": "2022-12-02T02:06:36+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/gcp/capture_the_flag/thunder_ctf/", "url": "https://hackingthe.cloud/gcp/capture_the_flag/thunder_ctf/", "title": "Thunder CTF", "content_html": "GCP themed CTF", "image": "https://hackingthe.cloud/assets/images/social/gcp/capture_the_flag/thunder_ctf.png", "date_modified": "2022-12-02T02:06:36+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/gcp/enumeration/enumerate_service_account_permissions/", "url": "https://hackingthe.cloud/gcp/enumeration/enumerate_service_account_permissions/", "title": "Enumerate Service Account Permissions", "content_html": "Brute force the permissions of a service account to see what you have access to.", "image": "https://hackingthe.cloud/assets/images/social/gcp/enumeration/enumerate_service_account_permissions.png", "date_modified": "2022-12-02T02:06:36+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/gcp/general-knowledge/default-account-names/", "url": "https://hackingthe.cloud/gcp/general-knowledge/default-account-names/", "title": "Default Account Information", "content_html": "Default information on how accounts and service accounts exist in GCP", "image": "https://hackingthe.cloud/assets/images/social/gcp/general-knowledge/default-account-names.png", "date_modified": "2022-12-02T02:06:36+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/gcp/general-knowledge/metadata_in_google_cloud_instances/", "url": "https://hackingthe.cloud/gcp/general-knowledge/metadata_in_google_cloud_instances/", "title": "Metadata in Google Cloud Instances", "content_html": "Information about the data an attacker can access via GCP's API endpoints", "image": "https://hackingthe.cloud/assets/images/social/gcp/general-knowledge/metadata_in_google_cloud_instances.png", "date_modified": "2022-12-02T02:06:36+00:00", "authors": [], "tags": null}, {"id": "https://hackingthe.cloud/gcp/general-knowledge/security-and-constraints/", "url": "https://hackingthe.cloud/gcp/general-knowledge/security-and-constraints/", "title": "Security and Constraints", "content_html": "Security considerations and constraints that are unique to GCP", "image": "https://hackingthe.cloud/assets/images/social/gcp/general-knowledge/security-and-constraints.png", "date_modified": "2022-12-02T02:06:36+00:00", "authors": [], "tags": null}]} \ No newline at end of file diff --git a/feed_rss_created.xml b/feed_rss_created.xml index 6a75fb3e3..0ed78f12c 100644 --- a/feed_rss_created.xml +++ b/feed_rss_created.xml @@ -1 +1 @@ - Hacking The CloudThe encyclopedia for offensive security in the cloud.https://hackingthe.cloud/https://github.com/Hacking-the-Cloud/hackingthe.clouden Mon, 21 Oct 2024 02:43:56 -0000 Mon, 21 Oct 2024 02:43:56 -0000 1440 MkDocs RSS plugin - v1.15.0 Run Command Abuse Utilise Azure RunCommands for execution and lateral movement.https://hackingthe.cloud/azure/run-command-abuse/ Sat, 05 Oct 2024 05:04:44 +0000Hacking The Cloudhttps://hackingthe.cloud/azure/run-command-abuse/ Exploiting Misconfigured GitLab OIDC AWS IAM Roles Discover how to identify and exploit misconfigured AWS IAM roles using GitLab OIDC, with a detailed, step-by-step guide.https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/exploiting_misconfigured_gitlab_oidc_aws_iam_roles/ Sun, 01 Sep 2024 22:46:15 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/exploiting_misconfigured_gitlab_oidc_aws_iam_roles/ CVE-2024-28056: Exploit an AWS Amplify Vulnerability in Same-Account Scenarios An in-depth explanation of how to still abuse CVE-2024-28056, a vulnerability in AWS Amplify that exposed IAM roles to takeover.https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/exploit_amplify_vulnerability_in_same_account_scenario/ Wed, 31 Jul 2024 20:37:36 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/exploit_amplify_vulnerability_in_same_account_scenario/ Prevent Expensive AWS API Actions with SCPs Avoid AWS bill surprises by blocking known-expensive API calls with an SCP.https://hackingthe.cloud/aws/general-knowledge/block-expensive-actions-with-scps/ Tue, 30 Jul 2024 00:15:57 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/general-knowledge/block-expensive-actions-with-scps/ Enumerate Org/Folder/Project Permissions + Individual Resource Permissions Brute force the permissions of all resources above to see what permissions you have. Includes example of brute forcing ~9500 permissions at the end. Also introduces tool that passively collections permissions allowed as run (gcpwn)https://hackingthe.cloud/gcp/enumeration/enumerate_all_permissions/ Sun, 14 Jul 2024 21:08:01 +0000Hacking The Cloudhttps://hackingthe.cloud/gcp/enumeration/enumerate_all_permissions/ Discover secrets in public AMIs How to find public AMIs and get stored secrets.https://hackingthe.cloud/aws/enumeration/discover_secrets_in_public_aims/ Tue, 28 May 2024 16:27:11 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/enumeration/discover_secrets_in_public_aims/ Enumerate Root User Email Address from the AWS Console Identify if an email address belongs to the root user of an AWS account.https://hackingthe.cloud/aws/enumeration/enumerate_root_email_from_console/ Tue, 21 May 2024 20:10:23 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/enumeration/enumerate_root_email_from_console/ Abusing Misconfigured Role Trust Policies with a Wildcard Principal How to take advantage of misconfigured role trust policies that have wildcard principals.https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/misconfigured_iam_role_trust_policy_wildcard_principal/ Mon, 29 Jan 2024 03:39:38 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/misconfigured_iam_role_trust_policy_wildcard_principal/ EC2 Privilege Escalation Through User Data How to escalate privileges on an EC2 instance by abusing user data.https://hackingthe.cloud/aws/exploitation/local_ec2_priv_esc_through_user_data/ Sun, 21 Jan 2024 17:59:06 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/local_ec2_priv_esc_through_user_data/ Bypass Cognito Account Enumeration Controls Leverage a flaw in Cognito's API to enumerate accounts in User Pools.https://hackingthe.cloud/aws/enumeration/bypass_cognito_user_enumeration_controls/ Sun, 07 Jan 2024 21:28:56 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/enumeration/bypass_cognito_user_enumeration_controls/ DNS and CloudFront Domain Takeover via Deleted S3 Buckets How orphaned Route53 records and CloudFront distributions can be taken over if the backing S3 bucket is deleted.https://hackingthe.cloud/aws/exploitation/orphaned_cloudfront_or_dns_takeover_via_s3/ Wed, 20 Dec 2023 14:50:27 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/orphaned_cloudfront_or_dns_takeover_via_s3/ 2023 Wrap-up An end of year summary for Hacking the Cloud in 2023.https://hackingthe.cloud/blog/2023_wrap-up/ Wed, 20 Dec 2023 01:25:13 +0000Hacking The Cloudhttps://hackingthe.cloud/blog/2023_wrap-up/ Data Exfiltration through S3 Server Access Logs Exfiltrate data via S3:GetObject and S3 server access logs.https://hackingthe.cloud/aws/exploitation/s3_server_access_logs/ Thu, 07 Dec 2023 10:12:13 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/s3_server_access_logs/ Derive a Principal ARN from an AWS Unique Identifier How to convert an unique identifier to a principal ARN.https://hackingthe.cloud/aws/enumeration/enumerate_principal_arn_from_unique_id/ Mon, 20 Nov 2023 00:54:35 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/enumeration/enumerate_principal_arn_from_unique_id/ Survive Access Key Deletion with sts:GetFederationToken Use sts:GetFederationToken to maintain access, even if the original IAM credentials are revoked.https://hackingthe.cloud/aws/post_exploitation/survive_access_key_deletion_with_sts_getfederationtoken/ Mon, 25 Sep 2023 13:24:44 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/post_exploitation/survive_access_key_deletion_with_sts_getfederationtoken/ AWS IAM Persistence Methods A catalog of methods to maintain access to the AWS control plane.https://hackingthe.cloud/aws/post_exploitation/iam_persistence/ Tue, 01 Aug 2023 01:58:06 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/post_exploitation/iam_persistence/ Download Tools and Exfiltrate Data with the AWS CLI Using the AWS CLI as a LOLScript to download and exfiltrate data.https://hackingthe.cloud/aws/post_exploitation/download_tools_and_exfiltrate_data_with_aws_cli/ Thu, 13 Jul 2023 03:46:27 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/post_exploitation/download_tools_and_exfiltrate_data_with_aws_cli/ Abusing Overpermissioned AWS Cognito Identity Pools How to take advantage of misconfigured Amazon Cognito Identity Pools.https://hackingthe.cloud/aws/exploitation/cognito_identity_pool_excessive_privileges/ Tue, 20 Jun 2023 17:26:14 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/cognito_identity_pool_excessive_privileges/ Abusing Unintended Self-Signup in AWS Cognito How to take advantage of misconfigured Amazon Cognito User Pools.https://hackingthe.cloud/aws/exploitation/cognito_user_self_signup/ Tue, 20 Jun 2023 17:26:14 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/cognito_user_self_signup/ Unauthenticated Enumeration of Azure Active Directory Email Addresses Discover how to exploit information disclosure configurations in Azure Active Directory to enumerate valid email addresses.https://hackingthe.cloud/azure/enum_email_addresses/ Tue, 11 Apr 2023 13:31:32 +0000Hacking The Cloudhttps://hackingthe.cloud/azure/enum_email_addresses/ Unauthenticated Enumeration of Google Workspace Email Addresses Discover how to exploit information disclosure configurations in Google Workspace to enumerate valid email addresses.https://hackingthe.cloud/gcp/enumeration/enum_email_addresses/ Tue, 11 Apr 2023 13:31:32 +0000Hacking The Cloudhttps://hackingthe.cloud/gcp/enumeration/enum_email_addresses/ Create a Console Session from IAM Credentials How to use IAM credentials to create an AWS Console session.https://hackingthe.cloud/aws/post_exploitation/create_a_console_session_from_iam_credentials/ Mon, 20 Feb 2023 16:48:45 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/post_exploitation/create_a_console_session_from_iam_credentials/ S3 Streaming Copy Utilizng standard out to standard in with aws-cli utilizing multiple profiles to avoid logging and detection in a victim environmenthttps://hackingthe.cloud/aws/exploitation/s3_streaming_copy/ Fri, 10 Feb 2023 15:12:48 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/s3_streaming_copy/ Exfiltrating S3 Data with Bucket Replication Policies Backdooring S3 buckets with Bucket Replication Policies.https://hackingthe.cloud/aws/exploitation/s3-bucket-replication-exfiltration/ Thu, 26 Jan 2023 01:02:06 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/s3-bucket-replication-exfiltration/ 2022 Wrap-up An end of year summary for Hacking the Cloud in 2022.https://hackingthe.cloud/blog/2022_wrap-up/ Wed, 14 Dec 2022 03:27:50 +0000Hacking The Cloudhttps://hackingthe.cloud/blog/2022_wrap-up/ Loot Public EBS Snapshots How to find and take advantage of exposed EBS snapshots.https://hackingthe.cloud/aws/enumeration/loot_public_ebs_snapshots/ Mon, 05 Dec 2022 02:08:42 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/enumeration/loot_public_ebs_snapshots/ Misconfigured Resource-Based Policies Common misconfigurations of resource-based policies and how they can be abused.https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/ Thu, 24 Nov 2022 22:14:38 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/ Abusing Misconfigured ECR Resource Policies How to take advantage of misconfigured AWS ECR private repositories.https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/misconfigured_ecr_resource_policy/ Thu, 24 Nov 2022 22:14:38 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/misconfigured_ecr_resource_policy/ AWS Organizations Defaults & Pivoting How to abuse AWS Organizations' default behavior and lateral movement capabilities.https://hackingthe.cloud/aws/general-knowledge/aws_organizations_defaults/ Sat, 05 Nov 2022 00:02:54 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/general-knowledge/aws_organizations_defaults/ Abusing Elastic Container Registry for Lateral Movement With ECR permissions you can easily distribute a backdoor to production servers, developer's laptops, or CI/CD pipelines and own the environment by gaining privileged permissions.https://hackingthe.cloud/aws/exploitation/abusing-container-registry/ Thu, 13 Oct 2022 01:37:41 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/abusing-container-registry/ Hacking The Cloud v2: New Look All about the new look for Hacking The Cloud v2.https://hackingthe.cloud/blog/v2_new_look/ Sun, 18 Sep 2022 21:18:30 +0000Hacking The Cloudhttps://hackingthe.cloud/blog/v2_new_look/ GCP Goat GCP Goat is the Vulnerable application for learning the GCP Securityhttps://hackingthe.cloud/gcp/capture_the_flag/gcp-goat/ Mon, 29 Aug 2022 00:18:19 +0000Hacking The Cloudhttps://hackingthe.cloud/gcp/capture_the_flag/gcp-goat/ Thunder CTF GCP themed CTFhttps://hackingthe.cloud/gcp/capture_the_flag/thunder_ctf/ Mon, 29 Aug 2022 00:18:19 +0000Hacking The Cloudhttps://hackingthe.cloud/gcp/capture_the_flag/thunder_ctf/ Hunting GCP Buckets How to find valid and invalid GCP Buckets using toolshttps://hackingthe.cloud/gcp/general-knowledge/gcp-buckets/ Mon, 29 Aug 2022 00:18:19 +0000Hacking The Cloudhttps://hackingthe.cloud/gcp/general-knowledge/gcp-buckets/ Privilege Escalation in Google Cloud Platform Privilege escalation techniques for Google Cloud Platform (GCP)https://hackingthe.cloud/gcp/exploitation/gcp_iam_privilege_escalation/ Wed, 24 Aug 2022 12:25:09 +0000Hacking The Cloudhttps://hackingthe.cloud/gcp/exploitation/gcp_iam_privilege_escalation/ Enumerate Service Account Permissions Brute force the permissions of a service account to see what you have access to.https://hackingthe.cloud/gcp/enumeration/enumerate_service_account_permissions/ Tue, 23 Aug 2022 14:34:53 +0000Hacking The Cloudhttps://hackingthe.cloud/gcp/enumeration/enumerate_service_account_permissions/ Terraform ANSI Escape Using ANSI Escape Sequences to Hide Malicious Terraform Codehttps://hackingthe.cloud/terraform/terraform_ansi_escape_evasion/ Sat, 09 Jul 2022 00:02:47 +0000Hacking The Cloudhttps://hackingthe.cloud/terraform/terraform_ansi_escape_evasion/ Default Account Information Default information on how accounts and service accounts exist in GCPhttps://hackingthe.cloud/gcp/general-knowledge/default-account-names/ Sun, 29 May 2022 13:26:35 +0000Hacking The Cloudhttps://hackingthe.cloud/gcp/general-knowledge/default-account-names/ Security and Constraints Security considerations and constraints that are unique to GCPhttps://hackingthe.cloud/gcp/general-knowledge/security-and-constraints/ Sun, 29 May 2022 13:26:35 +0000Hacking The Cloudhttps://hackingthe.cloud/gcp/general-knowledge/security-and-constraints/ Using Stolen IAM Credentials How to work with stolen IAM credentials and things to consider.https://hackingthe.cloud/aws/general-knowledge/using_stolen_iam_credentials/ Sat, 14 May 2022 21:51:44 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/general-knowledge/using_stolen_iam_credentials/ Run Shell Commands on EC2 with Send Command or Session Manager Leverage privileged access in an AWS account to run arbitrary commands on an EC2 instance.https://hackingthe.cloud/aws/post_exploitation/run_shell_commands_on_ec2/ Mon, 11 Apr 2022 23:11:43 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/post_exploitation/run_shell_commands_on_ec2/ Abusing Managed Identities Abusing Managed Identitieshttps://hackingthe.cloud/azure/abusing-managed-identities/ Sun, 27 Mar 2022 16:57:50 +0000Hacking The Cloudhttps://hackingthe.cloud/azure/abusing-managed-identities/ Anonymous Blob Access Finding and accessing files stored in Azure Storage Accounts without authentication.https://hackingthe.cloud/azure/anonymous-blob-access/ Sat, 19 Mar 2022 16:57:37 +0000Hacking The Cloudhttps://hackingthe.cloud/azure/anonymous-blob-access/ Soft Deleted Blobs Recovering and accessing files in private Storage Accounts that have been deleted.https://hackingthe.cloud/azure/soft-deleted-blobs/ Thu, 17 Mar 2022 14:35:54 +0000Hacking The Cloudhttps://hackingthe.cloud/azure/soft-deleted-blobs/ AWS API Call Hijacking via ACM-PCA By modifying the route53 entries and utilizing the acm-pca private CA one can hijack the calls to AWS API inside the AWS VPChttps://hackingthe.cloud/aws/exploitation/route53_modification_privilege_escalation/ Sun, 13 Mar 2022 23:45:47 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/route53_modification_privilege_escalation/ CI/CDon't An AWS/GitLab CICD themed CTF.https://hackingthe.cloud/aws/capture_the_flag/cicdont/ Sat, 05 Mar 2022 04:00:57 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/capture_the_flag/cicdont/ Enumerate AWS Account ID from an EC2 Instance With access to an ec2 instance, you will be able to identify the AWS account it runs in.https://hackingthe.cloud/aws/enumeration/account_id_from_ec2/ Sun, 27 Feb 2022 22:50:13 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/enumeration/account_id_from_ec2/ [Deprecated] Whoami - Get Principal Name From Keys During an assessment you may find AWS IAM credentials. Use these tactics to identify the principal of the keys.https://hackingthe.cloud/aws/deprecated/whoami/ Wed, 09 Feb 2022 04:00:32 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/deprecated/whoami/ Modify GuardDuty Configuration Modify existing GuardDuty configurations in the target account to hinder alerting and remediation capabilities.https://hackingthe.cloud/aws/avoiding-detection/modify-guardduty-config/ Sun, 30 Jan 2022 10:32:26 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/avoiding-detection/modify-guardduty-config/ Terraform Enterprise: Attack the Metadata Service Leverage a default configuration in Terraform Enterprise to steal credentials from the Metadata Servicehttps://hackingthe.cloud/terraform/terraform_enterprise_metadata_service/ Thu, 23 Dec 2021 21:59:38 +0000Hacking The Cloudhttps://hackingthe.cloud/terraform/terraform_enterprise_metadata_service/ Hacking The Cloud The encyclopedia for offensive security in the cloudhttps://hackingthe.cloud/ Tue, 30 Nov 2021 05:00:09 +0000Hacking The Cloudhttps://hackingthe.cloud/ AWS IAM Privilege Escalation Techniques Common techniques that can be leveraged to escalate privileges in an AWS account.https://hackingthe.cloud/aws/exploitation/iam_privilege_escalation/ Thu, 04 Nov 2021 21:03:24 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/iam_privilege_escalation/ Metadata in Google Cloud Instances Information about the data an attacker can access via GCP's API endpointshttps://hackingthe.cloud/gcp/general-knowledge/metadata_in_google_cloud_instances/ Sun, 24 Oct 2021 17:41:56 +0000Hacking The Cloudhttps://hackingthe.cloud/gcp/general-knowledge/metadata_in_google_cloud_instances/ Lambda Persistence How to establish persistence on a Lambda function after getting remote code execution.https://hackingthe.cloud/aws/post_exploitation/lambda_persistence/ Thu, 16 Sep 2021 15:02:21 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/post_exploitation/lambda_persistence/ Get IAM Credentials from a Console Session Convert access to the AWS Console into IAM credentials.https://hackingthe.cloud/aws/post_exploitation/get_iam_creds_from_console_session/ Wed, 14 Jul 2021 20:46:17 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/post_exploitation/get_iam_creds_from_console_session/ [Deprecated] Enumerate Permissions without Logging to CloudTrail Leverage a bug in the AWS API to enumerate permissions for a role without logging to CloudTrail and alerting the Blue Team.https://hackingthe.cloud/aws/deprecated/stealth_perm_enum/ Tue, 18 May 2021 19:13:08 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/deprecated/stealth_perm_enum/ S3 File ACL Persistence Maintain access to S3 resources by configuring Access Control Lists associated with S3 Buckets or Objects.https://hackingthe.cloud/aws/post_exploitation/s3_acl_persistence/ Tue, 13 Apr 2021 02:53:30 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/post_exploitation/s3_acl_persistence/ Enumerate AWS Account ID from a Public S3 Bucket Knowing only the name of a public S3 bucket, you can ascertain the account ID it resides in.https://hackingthe.cloud/aws/enumeration/account_id_from_s3_bucket/ Sat, 03 Apr 2021 01:39:08 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/enumeration/account_id_from_s3_bucket/ Bypass GuardDuty Tor Client Findings Connect to the Tor network from an EC2 instance without alerting GuardDuty.https://hackingthe.cloud/aws/avoiding-detection/guardduty-tor-client/ Sat, 20 Feb 2021 04:07:08 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/avoiding-detection/guardduty-tor-client/ Intercept SSM Communications With access to an EC2 instance you can intercept, modify, and spoof SSM communications.https://hackingthe.cloud/aws/post_exploitation/intercept_ssm_communications/ Sat, 06 Feb 2021 17:17:59 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/post_exploitation/intercept_ssm_communications/ Role Chain Juggling Keep your access by chaining assume-role calls.https://hackingthe.cloud/aws/post_exploitation/role-chain-juggling/ Wed, 03 Feb 2021 03:20:50 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/post_exploitation/role-chain-juggling/ User Data Script Persistence Maintain access to an EC2 instance and it's IAM role via user data scripts.https://hackingthe.cloud/aws/post_exploitation/user_data_script_persistence/ Wed, 03 Feb 2021 03:20:50 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/post_exploitation/user_data_script_persistence/ Introduction to the Instance Metadata Service An introduction to the Instance Metadata Service and how to access it.https://hackingthe.cloud/aws/general-knowledge/intro_metadata_service/ Sun, 20 Dec 2020 20:10:43 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/general-knowledge/intro_metadata_service/ Introduction to User Data An introduction to EC2 User Data and how to access it.https://hackingthe.cloud/aws/general-knowledge/introduction_user_data/ Sun, 20 Dec 2020 20:10:43 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/general-knowledge/introduction_user_data/ Brute Force IAM Permissions Brute force the IAM permissions of a user or role to see what you have access to.https://hackingthe.cloud/aws/enumeration/brute_force_iam_permissions/ Sun, 20 Dec 2020 18:58:26 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/enumeration/brute_force_iam_permissions/ Get Account ID from AWS Access Keys Techniques to enumerate the account ID associated with an AWS access key.https://hackingthe.cloud/aws/enumeration/get-account-id-from-keys/ Sun, 27 Sep 2020 16:06:37 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/enumeration/get-account-id-from-keys/ Whoami - Get Principal Name From Keys During an assessment you may find AWS IAM credentials. Use these tactics to identify the principal of the keys.https://hackingthe.cloud/aws/enumeration/whoami/ Fri, 21 Aug 2020 17:00:02 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/enumeration/whoami/ Steal IAM Credentials and Event Data from Lambda Leverage file read and SSRF vulnerabilities to steam IAM credentials and event data from Lambda.https://hackingthe.cloud/aws/exploitation/lambda-steal-iam-credentials/ Wed, 12 Aug 2020 23:15:50 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/lambda-steal-iam-credentials/ Unauthenticated Enumeration of IAM Users and Roles Discover how to exploit cross-account behaviors to enumerate IAM users and roles in another AWS account without authentication.https://hackingthe.cloud/aws/enumeration/enum_iam_user_role/ Wed, 05 Aug 2020 14:32:32 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/enumeration/enum_iam_user_role/ Steal EC2 Metadata Credentials via SSRF Old faithful; How to steal IAM Role credentials from the EC2 Metadata service via SSRF.https://hackingthe.cloud/aws/exploitation/ec2-metadata-ssrf/ Sat, 01 Aug 2020 17:43:14 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/ec2-metadata-ssrf/ Connection Tracking Abuse security group connection tracking to maintain persistence even when security group rules are changed.https://hackingthe.cloud/aws/general-knowledge/connection-tracking/ Thu, 30 Jul 2020 23:28:52 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/general-knowledge/connection-tracking/ IAM unique identifiers Chart of the IAM unique ID prefixes.https://hackingthe.cloud/aws/general-knowledge/iam-key-identifiers/ Mon, 27 Jul 2020 19:47:46 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/general-knowledge/iam-key-identifiers/ Bypass GuardDuty Pentest Findings Prevent Kali Linux, ParrotOS, and Pentoo Linux from throwing GuardDuty alerts by modifying the User Agent string.https://hackingthe.cloud/aws/avoiding-detection/guardduty-pentest/ Wed, 22 Jul 2020 02:58:24 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/avoiding-detection/guardduty-pentest/ Bypass Credential Exfiltration Detection When stealing IAM credentials from an EC2 instance you can avoid a GuardDuty detection by using VPC Endpoints.https://hackingthe.cloud/aws/avoiding-detection/steal-keys-undetected/ Wed, 22 Jul 2020 02:58:24 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/avoiding-detection/steal-keys-undetected/ \ No newline at end of file + Hacking The CloudThe encyclopedia for offensive security in the cloud.https://hackingthe.cloud/https://github.com/Hacking-the-Cloud/hackingthe.clouden Wed, 30 Oct 2024 22:46:02 -0000 Wed, 30 Oct 2024 22:46:02 -0000 1440 MkDocs RSS plugin - v1.16.0 Run Command Abuse Utilise Azure RunCommands for execution and lateral movement.https://hackingthe.cloud/azure/run-command-abuse/ Sat, 05 Oct 2024 05:04:44 +0000Hacking The Cloudhttps://hackingthe.cloud/azure/run-command-abuse/ Exploiting Misconfigured GitLab OIDC AWS IAM Roles Discover how to identify and exploit misconfigured AWS IAM roles using GitLab OIDC, with a detailed, step-by-step guide.https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/exploiting_misconfigured_gitlab_oidc_aws_iam_roles/ Sun, 01 Sep 2024 22:46:15 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/exploiting_misconfigured_gitlab_oidc_aws_iam_roles/ CVE-2024-28056: Exploit an AWS Amplify Vulnerability in Same-Account Scenarios An in-depth explanation of how to still abuse CVE-2024-28056, a vulnerability in AWS Amplify that exposed IAM roles to takeover.https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/exploit_amplify_vulnerability_in_same_account_scenario/ Wed, 31 Jul 2024 20:37:36 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/exploit_amplify_vulnerability_in_same_account_scenario/ Prevent Expensive AWS API Actions with SCPs Avoid AWS bill surprises by blocking known-expensive API calls with an SCP.https://hackingthe.cloud/aws/general-knowledge/block-expensive-actions-with-scps/ Tue, 30 Jul 2024 00:15:57 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/general-knowledge/block-expensive-actions-with-scps/ Enumerate Org/Folder/Project Permissions + Individual Resource Permissions Brute force the permissions of all resources above to see what permissions you have. Includes example of brute forcing ~9500 permissions at the end. Also introduces tool that passively collections permissions allowed as run (gcpwn)https://hackingthe.cloud/gcp/enumeration/enumerate_all_permissions/ Sun, 14 Jul 2024 21:08:01 +0000Hacking The Cloudhttps://hackingthe.cloud/gcp/enumeration/enumerate_all_permissions/ Discover secrets in public AMIs How to find public AMIs and get stored secrets.https://hackingthe.cloud/aws/enumeration/discover_secrets_in_public_aims/ Tue, 28 May 2024 16:27:11 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/enumeration/discover_secrets_in_public_aims/ Enumerate Root User Email Address from the AWS Console Identify if an email address belongs to the root user of an AWS account.https://hackingthe.cloud/aws/enumeration/enumerate_root_email_from_console/ Tue, 21 May 2024 20:10:23 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/enumeration/enumerate_root_email_from_console/ Abusing Misconfigured Role Trust Policies with a Wildcard Principal How to take advantage of misconfigured role trust policies that have wildcard principals.https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/misconfigured_iam_role_trust_policy_wildcard_principal/ Mon, 29 Jan 2024 03:39:38 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/misconfigured_iam_role_trust_policy_wildcard_principal/ EC2 Privilege Escalation Through User Data How to escalate privileges on an EC2 instance by abusing user data.https://hackingthe.cloud/aws/exploitation/local_ec2_priv_esc_through_user_data/ Sun, 21 Jan 2024 17:59:06 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/local_ec2_priv_esc_through_user_data/ Bypass Cognito Account Enumeration Controls Leverage a flaw in Cognito's API to enumerate accounts in User Pools.https://hackingthe.cloud/aws/enumeration/bypass_cognito_user_enumeration_controls/ Sun, 07 Jan 2024 21:28:56 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/enumeration/bypass_cognito_user_enumeration_controls/ DNS and CloudFront Domain Takeover via Deleted S3 Buckets How orphaned Route53 records and CloudFront distributions can be taken over if the backing S3 bucket is deleted.https://hackingthe.cloud/aws/exploitation/orphaned_cloudfront_or_dns_takeover_via_s3/ Wed, 20 Dec 2023 14:50:27 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/orphaned_cloudfront_or_dns_takeover_via_s3/ 2023 Wrap-up An end of year summary for Hacking the Cloud in 2023.https://hackingthe.cloud/blog/2023_wrap-up/ Wed, 20 Dec 2023 01:25:13 +0000Hacking The Cloudhttps://hackingthe.cloud/blog/2023_wrap-up/ Data Exfiltration through S3 Server Access Logs Exfiltrate data via S3:GetObject and S3 server access logs.https://hackingthe.cloud/aws/exploitation/s3_server_access_logs/ Thu, 07 Dec 2023 10:12:13 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/s3_server_access_logs/ Derive a Principal ARN from an AWS Unique Identifier How to convert an unique identifier to a principal ARN.https://hackingthe.cloud/aws/enumeration/enumerate_principal_arn_from_unique_id/ Mon, 20 Nov 2023 00:54:35 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/enumeration/enumerate_principal_arn_from_unique_id/ Survive Access Key Deletion with sts:GetFederationToken Use sts:GetFederationToken to maintain access, even if the original IAM credentials are revoked.https://hackingthe.cloud/aws/post_exploitation/survive_access_key_deletion_with_sts_getfederationtoken/ Mon, 25 Sep 2023 13:24:44 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/post_exploitation/survive_access_key_deletion_with_sts_getfederationtoken/ AWS IAM Persistence Methods A catalog of methods to maintain access to the AWS control plane.https://hackingthe.cloud/aws/post_exploitation/iam_persistence/ Tue, 01 Aug 2023 01:58:06 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/post_exploitation/iam_persistence/ Download Tools and Exfiltrate Data with the AWS CLI Using the AWS CLI as a LOLScript to download and exfiltrate data.https://hackingthe.cloud/aws/post_exploitation/download_tools_and_exfiltrate_data_with_aws_cli/ Thu, 13 Jul 2023 03:46:27 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/post_exploitation/download_tools_and_exfiltrate_data_with_aws_cli/ Abusing Overpermissioned AWS Cognito Identity Pools How to take advantage of misconfigured Amazon Cognito Identity Pools.https://hackingthe.cloud/aws/exploitation/cognito_identity_pool_excessive_privileges/ Tue, 20 Jun 2023 17:26:14 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/cognito_identity_pool_excessive_privileges/ Abusing Unintended Self-Signup in AWS Cognito How to take advantage of misconfigured Amazon Cognito User Pools.https://hackingthe.cloud/aws/exploitation/cognito_user_self_signup/ Tue, 20 Jun 2023 17:26:14 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/cognito_user_self_signup/ Unauthenticated Enumeration of Azure Active Directory Email Addresses Discover how to exploit information disclosure configurations in Azure Active Directory to enumerate valid email addresses.https://hackingthe.cloud/azure/enum_email_addresses/ Tue, 11 Apr 2023 13:31:32 +0000Hacking The Cloudhttps://hackingthe.cloud/azure/enum_email_addresses/ Unauthenticated Enumeration of Google Workspace Email Addresses Discover how to exploit information disclosure configurations in Google Workspace to enumerate valid email addresses.https://hackingthe.cloud/gcp/enumeration/enum_email_addresses/ Tue, 11 Apr 2023 13:31:32 +0000Hacking The Cloudhttps://hackingthe.cloud/gcp/enumeration/enum_email_addresses/ Create a Console Session from IAM Credentials How to use IAM credentials to create an AWS Console session.https://hackingthe.cloud/aws/post_exploitation/create_a_console_session_from_iam_credentials/ Mon, 20 Feb 2023 16:48:45 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/post_exploitation/create_a_console_session_from_iam_credentials/ S3 Streaming Copy Utilizng standard out to standard in with aws-cli utilizing multiple profiles to avoid logging and detection in a victim environmenthttps://hackingthe.cloud/aws/exploitation/s3_streaming_copy/ Fri, 10 Feb 2023 15:12:48 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/s3_streaming_copy/ Exfiltrating S3 Data with Bucket Replication Policies Backdooring S3 buckets with Bucket Replication Policies.https://hackingthe.cloud/aws/exploitation/s3-bucket-replication-exfiltration/ Thu, 26 Jan 2023 01:02:06 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/s3-bucket-replication-exfiltration/ 2022 Wrap-up An end of year summary for Hacking the Cloud in 2022.https://hackingthe.cloud/blog/2022_wrap-up/ Wed, 14 Dec 2022 03:27:50 +0000Hacking The Cloudhttps://hackingthe.cloud/blog/2022_wrap-up/ Loot Public EBS Snapshots How to find and take advantage of exposed EBS snapshots.https://hackingthe.cloud/aws/enumeration/loot_public_ebs_snapshots/ Mon, 05 Dec 2022 02:08:42 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/enumeration/loot_public_ebs_snapshots/ Misconfigured Resource-Based Policies Common misconfigurations of resource-based policies and how they can be abused.https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/ Thu, 24 Nov 2022 22:14:38 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/ Abusing Misconfigured ECR Resource Policies How to take advantage of misconfigured AWS ECR private repositories.https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/misconfigured_ecr_resource_policy/ Thu, 24 Nov 2022 22:14:38 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/misconfigured_ecr_resource_policy/ AWS Organizations Defaults & Pivoting How to abuse AWS Organizations' default behavior and lateral movement capabilities.https://hackingthe.cloud/aws/general-knowledge/aws_organizations_defaults/ Sat, 05 Nov 2022 00:02:54 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/general-knowledge/aws_organizations_defaults/ Abusing Elastic Container Registry for Lateral Movement With ECR permissions you can easily distribute a backdoor to production servers, developer's laptops, or CI/CD pipelines and own the environment by gaining privileged permissions.https://hackingthe.cloud/aws/exploitation/abusing-container-registry/ Thu, 13 Oct 2022 01:37:41 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/abusing-container-registry/ Hacking The Cloud v2: New Look All about the new look for Hacking The Cloud v2.https://hackingthe.cloud/blog/v2_new_look/ Sun, 18 Sep 2022 21:18:30 +0000Hacking The Cloudhttps://hackingthe.cloud/blog/v2_new_look/ GCP Goat GCP Goat is the Vulnerable application for learning the GCP Securityhttps://hackingthe.cloud/gcp/capture_the_flag/gcp-goat/ Mon, 29 Aug 2022 00:18:19 +0000Hacking The Cloudhttps://hackingthe.cloud/gcp/capture_the_flag/gcp-goat/ Thunder CTF GCP themed CTFhttps://hackingthe.cloud/gcp/capture_the_flag/thunder_ctf/ Mon, 29 Aug 2022 00:18:19 +0000Hacking The Cloudhttps://hackingthe.cloud/gcp/capture_the_flag/thunder_ctf/ Hunting GCP Buckets How to find valid and invalid GCP Buckets using toolshttps://hackingthe.cloud/gcp/general-knowledge/gcp-buckets/ Mon, 29 Aug 2022 00:18:19 +0000Hacking The Cloudhttps://hackingthe.cloud/gcp/general-knowledge/gcp-buckets/ Privilege Escalation in Google Cloud Platform Privilege escalation techniques for Google Cloud Platform (GCP)https://hackingthe.cloud/gcp/exploitation/gcp_iam_privilege_escalation/ Wed, 24 Aug 2022 12:25:09 +0000Hacking The Cloudhttps://hackingthe.cloud/gcp/exploitation/gcp_iam_privilege_escalation/ Enumerate Service Account Permissions Brute force the permissions of a service account to see what you have access to.https://hackingthe.cloud/gcp/enumeration/enumerate_service_account_permissions/ Tue, 23 Aug 2022 14:34:53 +0000Hacking The Cloudhttps://hackingthe.cloud/gcp/enumeration/enumerate_service_account_permissions/ Terraform ANSI Escape Using ANSI Escape Sequences to Hide Malicious Terraform Codehttps://hackingthe.cloud/terraform/terraform_ansi_escape_evasion/ Sat, 09 Jul 2022 00:02:47 +0000Hacking The Cloudhttps://hackingthe.cloud/terraform/terraform_ansi_escape_evasion/ Default Account Information Default information on how accounts and service accounts exist in GCPhttps://hackingthe.cloud/gcp/general-knowledge/default-account-names/ Sun, 29 May 2022 13:26:35 +0000Hacking The Cloudhttps://hackingthe.cloud/gcp/general-knowledge/default-account-names/ Security and Constraints Security considerations and constraints that are unique to GCPhttps://hackingthe.cloud/gcp/general-knowledge/security-and-constraints/ Sun, 29 May 2022 13:26:35 +0000Hacking The Cloudhttps://hackingthe.cloud/gcp/general-knowledge/security-and-constraints/ Using Stolen IAM Credentials How to work with stolen IAM credentials and things to consider.https://hackingthe.cloud/aws/general-knowledge/using_stolen_iam_credentials/ Sat, 14 May 2022 21:51:44 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/general-knowledge/using_stolen_iam_credentials/ Run Shell Commands on EC2 with Send Command or Session Manager Leverage privileged access in an AWS account to run arbitrary commands on an EC2 instance.https://hackingthe.cloud/aws/post_exploitation/run_shell_commands_on_ec2/ Mon, 11 Apr 2022 23:11:43 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/post_exploitation/run_shell_commands_on_ec2/ Abusing Managed Identities Abusing Managed Identitieshttps://hackingthe.cloud/azure/abusing-managed-identities/ Sun, 27 Mar 2022 16:57:50 +0000Hacking The Cloudhttps://hackingthe.cloud/azure/abusing-managed-identities/ Anonymous Blob Access Finding and accessing files stored in Azure Storage Accounts without authentication.https://hackingthe.cloud/azure/anonymous-blob-access/ Sat, 19 Mar 2022 16:57:37 +0000Hacking The Cloudhttps://hackingthe.cloud/azure/anonymous-blob-access/ Soft Deleted Blobs Recovering and accessing files in private Storage Accounts that have been deleted.https://hackingthe.cloud/azure/soft-deleted-blobs/ Thu, 17 Mar 2022 14:35:54 +0000Hacking The Cloudhttps://hackingthe.cloud/azure/soft-deleted-blobs/ AWS API Call Hijacking via ACM-PCA By modifying the route53 entries and utilizing the acm-pca private CA one can hijack the calls to AWS API inside the AWS VPChttps://hackingthe.cloud/aws/exploitation/route53_modification_privilege_escalation/ Sun, 13 Mar 2022 23:45:47 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/route53_modification_privilege_escalation/ CI/CDon't An AWS/GitLab CICD themed CTF.https://hackingthe.cloud/aws/capture_the_flag/cicdont/ Sat, 05 Mar 2022 04:00:57 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/capture_the_flag/cicdont/ Enumerate AWS Account ID from an EC2 Instance With access to an ec2 instance, you will be able to identify the AWS account it runs in.https://hackingthe.cloud/aws/enumeration/account_id_from_ec2/ Sun, 27 Feb 2022 22:50:13 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/enumeration/account_id_from_ec2/ [Deprecated] Whoami - Get Principal Name From Keys During an assessment you may find AWS IAM credentials. Use these tactics to identify the principal of the keys.https://hackingthe.cloud/aws/deprecated/whoami/ Wed, 09 Feb 2022 04:00:32 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/deprecated/whoami/ Modify GuardDuty Configuration Modify existing GuardDuty configurations in the target account to hinder alerting and remediation capabilities.https://hackingthe.cloud/aws/avoiding-detection/modify-guardduty-config/ Sun, 30 Jan 2022 10:32:26 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/avoiding-detection/modify-guardduty-config/ Terraform Enterprise: Attack the Metadata Service Leverage a default configuration in Terraform Enterprise to steal credentials from the Metadata Servicehttps://hackingthe.cloud/terraform/terraform_enterprise_metadata_service/ Thu, 23 Dec 2021 21:59:38 +0000Hacking The Cloudhttps://hackingthe.cloud/terraform/terraform_enterprise_metadata_service/ Hacking The Cloud The encyclopedia for offensive security in the cloudhttps://hackingthe.cloud/ Tue, 30 Nov 2021 05:00:09 +0000Hacking The Cloudhttps://hackingthe.cloud/ AWS IAM Privilege Escalation Techniques Common techniques that can be leveraged to escalate privileges in an AWS account.https://hackingthe.cloud/aws/exploitation/iam_privilege_escalation/ Thu, 04 Nov 2021 21:03:24 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/iam_privilege_escalation/ Metadata in Google Cloud Instances Information about the data an attacker can access via GCP's API endpointshttps://hackingthe.cloud/gcp/general-knowledge/metadata_in_google_cloud_instances/ Sun, 24 Oct 2021 17:41:56 +0000Hacking The Cloudhttps://hackingthe.cloud/gcp/general-knowledge/metadata_in_google_cloud_instances/ Lambda Persistence How to establish persistence on a Lambda function after getting remote code execution.https://hackingthe.cloud/aws/post_exploitation/lambda_persistence/ Thu, 16 Sep 2021 15:02:21 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/post_exploitation/lambda_persistence/ Get IAM Credentials from a Console Session Convert access to the AWS Console into IAM credentials.https://hackingthe.cloud/aws/post_exploitation/get_iam_creds_from_console_session/ Wed, 14 Jul 2021 20:46:17 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/post_exploitation/get_iam_creds_from_console_session/ [Deprecated] Enumerate Permissions without Logging to CloudTrail Leverage a bug in the AWS API to enumerate permissions for a role without logging to CloudTrail and alerting the Blue Team.https://hackingthe.cloud/aws/deprecated/stealth_perm_enum/ Tue, 18 May 2021 19:13:08 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/deprecated/stealth_perm_enum/ S3 File ACL Persistence Maintain access to S3 resources by configuring Access Control Lists associated with S3 Buckets or Objects.https://hackingthe.cloud/aws/post_exploitation/s3_acl_persistence/ Tue, 13 Apr 2021 02:53:30 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/post_exploitation/s3_acl_persistence/ Enumerate AWS Account ID from a Public S3 Bucket Knowing only the name of a public S3 bucket, you can ascertain the account ID it resides in.https://hackingthe.cloud/aws/enumeration/account_id_from_s3_bucket/ Sat, 03 Apr 2021 01:39:08 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/enumeration/account_id_from_s3_bucket/ Bypass GuardDuty Tor Client Findings Connect to the Tor network from an EC2 instance without alerting GuardDuty.https://hackingthe.cloud/aws/avoiding-detection/guardduty-tor-client/ Sat, 20 Feb 2021 04:07:08 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/avoiding-detection/guardduty-tor-client/ Intercept SSM Communications With access to an EC2 instance you can intercept, modify, and spoof SSM communications.https://hackingthe.cloud/aws/post_exploitation/intercept_ssm_communications/ Sat, 06 Feb 2021 17:17:59 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/post_exploitation/intercept_ssm_communications/ Role Chain Juggling Keep your access by chaining assume-role calls.https://hackingthe.cloud/aws/post_exploitation/role-chain-juggling/ Wed, 03 Feb 2021 03:20:50 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/post_exploitation/role-chain-juggling/ User Data Script Persistence Maintain access to an EC2 instance and it's IAM role via user data scripts.https://hackingthe.cloud/aws/post_exploitation/user_data_script_persistence/ Wed, 03 Feb 2021 03:20:50 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/post_exploitation/user_data_script_persistence/ Introduction to the Instance Metadata Service An introduction to the Instance Metadata Service and how to access it.https://hackingthe.cloud/aws/general-knowledge/intro_metadata_service/ Sun, 20 Dec 2020 20:10:43 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/general-knowledge/intro_metadata_service/ Introduction to User Data An introduction to EC2 User Data and how to access it.https://hackingthe.cloud/aws/general-knowledge/introduction_user_data/ Sun, 20 Dec 2020 20:10:43 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/general-knowledge/introduction_user_data/ Brute Force IAM Permissions Brute force the IAM permissions of a user or role to see what you have access to.https://hackingthe.cloud/aws/enumeration/brute_force_iam_permissions/ Sun, 20 Dec 2020 18:58:26 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/enumeration/brute_force_iam_permissions/ Get Account ID from AWS Access Keys Techniques to enumerate the account ID associated with an AWS access key.https://hackingthe.cloud/aws/enumeration/get-account-id-from-keys/ Sun, 27 Sep 2020 16:06:37 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/enumeration/get-account-id-from-keys/ Whoami - Get Principal Name From Keys During an assessment you may find AWS IAM credentials. Use these tactics to identify the principal of the keys.https://hackingthe.cloud/aws/enumeration/whoami/ Fri, 21 Aug 2020 17:00:02 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/enumeration/whoami/ Steal IAM Credentials and Event Data from Lambda Leverage file read and SSRF vulnerabilities to steam IAM credentials and event data from Lambda.https://hackingthe.cloud/aws/exploitation/lambda-steal-iam-credentials/ Wed, 12 Aug 2020 23:15:50 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/lambda-steal-iam-credentials/ Unauthenticated Enumeration of IAM Users and Roles Discover how to exploit cross-account behaviors to enumerate IAM users and roles in another AWS account without authentication.https://hackingthe.cloud/aws/enumeration/enum_iam_user_role/ Wed, 05 Aug 2020 14:32:32 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/enumeration/enum_iam_user_role/ Steal EC2 Metadata Credentials via SSRF Old faithful; How to steal IAM Role credentials from the EC2 Metadata service via SSRF.https://hackingthe.cloud/aws/exploitation/ec2-metadata-ssrf/ Sat, 01 Aug 2020 17:43:14 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/ec2-metadata-ssrf/ Connection Tracking Abuse security group connection tracking to maintain persistence even when security group rules are changed.https://hackingthe.cloud/aws/general-knowledge/connection-tracking/ Thu, 30 Jul 2020 23:28:52 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/general-knowledge/connection-tracking/ IAM unique identifiers Chart of the IAM unique ID prefixes.https://hackingthe.cloud/aws/general-knowledge/iam-key-identifiers/ Mon, 27 Jul 2020 19:47:46 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/general-knowledge/iam-key-identifiers/ Bypass GuardDuty Pentest Findings Prevent Kali Linux, ParrotOS, and Pentoo Linux from throwing GuardDuty alerts by modifying the User Agent string.https://hackingthe.cloud/aws/avoiding-detection/guardduty-pentest/ Wed, 22 Jul 2020 02:58:24 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/avoiding-detection/guardduty-pentest/ Bypass Credential Exfiltration Detection When stealing IAM credentials from an EC2 instance you can avoid a GuardDuty detection by using VPC Endpoints.https://hackingthe.cloud/aws/avoiding-detection/steal-keys-undetected/ Wed, 22 Jul 2020 02:58:24 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/avoiding-detection/steal-keys-undetected/ \ No newline at end of file diff --git a/feed_rss_updated.xml b/feed_rss_updated.xml index 9fc165645..33782735b 100644 --- a/feed_rss_updated.xml +++ b/feed_rss_updated.xml @@ -1 +1 @@ - Hacking The CloudThe encyclopedia for offensive security in the cloud.https://hackingthe.cloud/https://github.com/Hacking-the-Cloud/hackingthe.clouden Mon, 21 Oct 2024 02:43:56 -0000 Mon, 21 Oct 2024 02:43:56 -0000 1440 MkDocs RSS plugin - v1.15.0 Run Command Abuse Utilise Azure RunCommands for execution and lateral movement.https://hackingthe.cloud/azure/run-command-abuse/ Sat, 05 Oct 2024 05:04:44 +0000Hacking The Cloudhttps://hackingthe.cloud/azure/run-command-abuse/ Exploiting Misconfigured GitLab OIDC AWS IAM Roles Discover how to identify and exploit misconfigured AWS IAM roles using GitLab OIDC, with a detailed, step-by-step guide.https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/exploiting_misconfigured_gitlab_oidc_aws_iam_roles/ Sun, 01 Sep 2024 22:56:49 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/exploiting_misconfigured_gitlab_oidc_aws_iam_roles/ CVE-2024-28056: Exploit an AWS Amplify Vulnerability in Same-Account Scenarios An in-depth explanation of how to still abuse CVE-2024-28056, a vulnerability in AWS Amplify that exposed IAM roles to takeover.https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/exploit_amplify_vulnerability_in_same_account_scenario/ Tue, 20 Aug 2024 13:46:12 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/exploit_amplify_vulnerability_in_same_account_scenario/ Steal IAM Credentials and Event Data from Lambda Leverage file read and SSRF vulnerabilities to steam IAM credentials and event data from Lambda.https://hackingthe.cloud/aws/exploitation/lambda-steal-iam-credentials/ Tue, 20 Aug 2024 01:29:51 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/lambda-steal-iam-credentials/ Abusing Misconfigured Role Trust Policies with a Wildcard Principal How to take advantage of misconfigured role trust policies that have wildcard principals.https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/misconfigured_iam_role_trust_policy_wildcard_principal/ Sun, 04 Aug 2024 21:24:46 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/misconfigured_iam_role_trust_policy_wildcard_principal/ Prevent Expensive AWS API Actions with SCPs Avoid AWS bill surprises by blocking known-expensive API calls with an SCP.https://hackingthe.cloud/aws/general-knowledge/block-expensive-actions-with-scps/ Tue, 30 Jul 2024 15:11:00 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/general-knowledge/block-expensive-actions-with-scps/ Enumerate Org/Folder/Project Permissions + Individual Resource Permissions Brute force the permissions of all resources above to see what permissions you have. Includes example of brute forcing ~9500 permissions at the end. Also introduces tool that passively collections permissions allowed as run (gcpwn)https://hackingthe.cloud/gcp/enumeration/enumerate_all_permissions/ Sun, 14 Jul 2024 21:50:00 +0000Hacking The Cloudhttps://hackingthe.cloud/gcp/enumeration/enumerate_all_permissions/ Abusing Managed Identities Abusing Managed Identitieshttps://hackingthe.cloud/azure/abusing-managed-identities/ Sat, 15 Jun 2024 06:21:29 +0000Hacking The Cloudhttps://hackingthe.cloud/azure/abusing-managed-identities/ Discover secrets in public AMIs How to find public AMIs and get stored secrets.https://hackingthe.cloud/aws/enumeration/discover_secrets_in_public_aims/ Wed, 29 May 2024 03:08:56 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/enumeration/discover_secrets_in_public_aims/ Unauthenticated Enumeration of IAM Users and Roles Discover how to exploit cross-account behaviors to enumerate IAM users and roles in another AWS account without authentication.https://hackingthe.cloud/aws/enumeration/enum_iam_user_role/ Tue, 28 May 2024 14:52:34 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/enumeration/enum_iam_user_role/ Enumerate Root User Email Address from the AWS Console Identify if an email address belongs to the root user of an AWS account.https://hackingthe.cloud/aws/enumeration/enumerate_root_email_from_console/ Tue, 21 May 2024 20:10:23 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/enumeration/enumerate_root_email_from_console/ Enumerate AWS Account ID from a Public S3 Bucket Knowing only the name of a public S3 bucket, you can ascertain the account ID it resides in.https://hackingthe.cloud/aws/enumeration/account_id_from_s3_bucket/ Sun, 14 Apr 2024 19:40:37 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/enumeration/account_id_from_s3_bucket/ AWS Organizations Defaults & Pivoting How to abuse AWS Organizations' default behavior and lateral movement capabilities.https://hackingthe.cloud/aws/general-knowledge/aws_organizations_defaults/ Thu, 07 Mar 2024 02:17:49 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/general-knowledge/aws_organizations_defaults/ Anonymous Blob Access Finding and accessing files stored in Azure Storage Accounts without authentication.https://hackingthe.cloud/azure/anonymous-blob-access/ Thu, 07 Mar 2024 02:17:49 +0000Hacking The Cloudhttps://hackingthe.cloud/azure/anonymous-blob-access/ Soft Deleted Blobs Recovering and accessing files in private Storage Accounts that have been deleted.https://hackingthe.cloud/azure/soft-deleted-blobs/ Thu, 07 Mar 2024 02:17:49 +0000Hacking The Cloudhttps://hackingthe.cloud/azure/soft-deleted-blobs/ Hacking The Cloud The encyclopedia for offensive security in the cloudhttps://hackingthe.cloud/ Mon, 19 Feb 2024 21:07:18 +0000Hacking The Cloudhttps://hackingthe.cloud/ Bypass GuardDuty Pentest Findings Prevent Kali Linux, ParrotOS, and Pentoo Linux from throwing GuardDuty alerts by modifying the User Agent string.https://hackingthe.cloud/aws/avoiding-detection/guardduty-pentest/ Mon, 19 Feb 2024 21:07:18 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/avoiding-detection/guardduty-pentest/ CI/CDon't An AWS/GitLab CICD themed CTF.https://hackingthe.cloud/aws/capture_the_flag/cicdont/ Mon, 19 Feb 2024 21:07:18 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/capture_the_flag/cicdont/ [Deprecated] Enumerate Permissions without Logging to CloudTrail Leverage a bug in the AWS API to enumerate permissions for a role without logging to CloudTrail and alerting the Blue Team.https://hackingthe.cloud/aws/deprecated/stealth_perm_enum/ Mon, 19 Feb 2024 21:07:18 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/deprecated/stealth_perm_enum/ Loot Public EBS Snapshots How to find and take advantage of exposed EBS snapshots.https://hackingthe.cloud/aws/enumeration/loot_public_ebs_snapshots/ Mon, 19 Feb 2024 21:07:18 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/enumeration/loot_public_ebs_snapshots/ Abusing Elastic Container Registry for Lateral Movement With ECR permissions you can easily distribute a backdoor to production servers, developer's laptops, or CI/CD pipelines and own the environment by gaining privileged permissions.https://hackingthe.cloud/aws/exploitation/abusing-container-registry/ Mon, 19 Feb 2024 21:07:18 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/abusing-container-registry/ Steal EC2 Metadata Credentials via SSRF Old faithful; How to steal IAM Role credentials from the EC2 Metadata service via SSRF.https://hackingthe.cloud/aws/exploitation/ec2-metadata-ssrf/ Mon, 19 Feb 2024 21:07:18 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/ec2-metadata-ssrf/ AWS IAM Privilege Escalation Techniques Common techniques that can be leveraged to escalate privileges in an AWS account.https://hackingthe.cloud/aws/exploitation/iam_privilege_escalation/ Mon, 19 Feb 2024 21:07:18 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/iam_privilege_escalation/ Exfiltrating S3 Data with Bucket Replication Policies Backdooring S3 buckets with Bucket Replication Policies.https://hackingthe.cloud/aws/exploitation/s3-bucket-replication-exfiltration/ Mon, 19 Feb 2024 21:07:18 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/s3-bucket-replication-exfiltration/ Abusing Misconfigured ECR Resource Policies How to take advantage of misconfigured AWS ECR private repositories.https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/misconfigured_ecr_resource_policy/ Mon, 19 Feb 2024 21:07:18 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/misconfigured_ecr_resource_policy/ Connection Tracking Abuse security group connection tracking to maintain persistence even when security group rules are changed.https://hackingthe.cloud/aws/general-knowledge/connection-tracking/ Mon, 19 Feb 2024 21:07:18 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/general-knowledge/connection-tracking/ Using Stolen IAM Credentials How to work with stolen IAM credentials and things to consider.https://hackingthe.cloud/aws/general-knowledge/using_stolen_iam_credentials/ Mon, 19 Feb 2024 21:07:18 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/general-knowledge/using_stolen_iam_credentials/ Create a Console Session from IAM Credentials How to use IAM credentials to create an AWS Console session.https://hackingthe.cloud/aws/post_exploitation/create_a_console_session_from_iam_credentials/ Mon, 19 Feb 2024 21:07:18 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/post_exploitation/create_a_console_session_from_iam_credentials/ Intercept SSM Communications With access to an EC2 instance you can intercept, modify, and spoof SSM communications.https://hackingthe.cloud/aws/post_exploitation/intercept_ssm_communications/ Mon, 19 Feb 2024 21:07:18 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/post_exploitation/intercept_ssm_communications/ Lambda Persistence How to establish persistence on a Lambda function after getting remote code execution.https://hackingthe.cloud/aws/post_exploitation/lambda_persistence/ Mon, 19 Feb 2024 21:07:18 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/post_exploitation/lambda_persistence/ User Data Script Persistence Maintain access to an EC2 instance and it's IAM role via user data scripts.https://hackingthe.cloud/aws/post_exploitation/user_data_script_persistence/ Mon, 19 Feb 2024 21:07:18 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/post_exploitation/user_data_script_persistence/ 2022 Wrap-up An end of year summary for Hacking the Cloud in 2022.https://hackingthe.cloud/blog/2022_wrap-up/ Mon, 19 Feb 2024 21:07:18 +0000Hacking The Cloudhttps://hackingthe.cloud/blog/2022_wrap-up/ 2023 Wrap-up An end of year summary for Hacking the Cloud in 2023.https://hackingthe.cloud/blog/2023_wrap-up/ Mon, 19 Feb 2024 21:07:18 +0000Hacking The Cloudhttps://hackingthe.cloud/blog/2023_wrap-up/ Hacking The Cloud v2: New Look All about the new look for Hacking The Cloud v2.https://hackingthe.cloud/blog/v2_new_look/ Mon, 19 Feb 2024 21:07:18 +0000Hacking The Cloudhttps://hackingthe.cloud/blog/v2_new_look/ Terraform ANSI Escape Using ANSI Escape Sequences to Hide Malicious Terraform Codehttps://hackingthe.cloud/terraform/terraform_ansi_escape_evasion/ Mon, 19 Feb 2024 21:07:18 +0000Hacking The Cloudhttps://hackingthe.cloud/terraform/terraform_ansi_escape_evasion/ Terraform Enterprise: Attack the Metadata Service Leverage a default configuration in Terraform Enterprise to steal credentials from the Metadata Servicehttps://hackingthe.cloud/terraform/terraform_enterprise_metadata_service/ Mon, 19 Feb 2024 21:07:18 +0000Hacking The Cloudhttps://hackingthe.cloud/terraform/terraform_enterprise_metadata_service/ Derive a Principal ARN from an AWS Unique Identifier How to convert an unique identifier to a principal ARN.https://hackingthe.cloud/aws/enumeration/enumerate_principal_arn_from_unique_id/ Thu, 15 Feb 2024 03:00:00 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/enumeration/enumerate_principal_arn_from_unique_id/ Get IAM Credentials from a Console Session Convert access to the AWS Console into IAM credentials.https://hackingthe.cloud/aws/post_exploitation/get_iam_creds_from_console_session/ Wed, 14 Feb 2024 03:21:21 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/post_exploitation/get_iam_creds_from_console_session/ Role Chain Juggling Keep your access by chaining assume-role calls.https://hackingthe.cloud/aws/post_exploitation/role-chain-juggling/ Fri, 09 Feb 2024 02:49:21 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/post_exploitation/role-chain-juggling/ [Deprecated] Whoami - Get Principal Name From Keys During an assessment you may find AWS IAM credentials. Use these tactics to identify the principal of the keys.https://hackingthe.cloud/aws/deprecated/whoami/ Fri, 02 Feb 2024 00:17:34 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/deprecated/whoami/ EC2 Privilege Escalation Through User Data How to escalate privileges on an EC2 instance by abusing user data.https://hackingthe.cloud/aws/exploitation/local_ec2_priv_esc_through_user_data/ Tue, 23 Jan 2024 00:25:07 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/local_ec2_priv_esc_through_user_data/ AWS IAM Persistence Methods A catalog of methods to maintain access to the AWS control plane.https://hackingthe.cloud/aws/post_exploitation/iam_persistence/ Sun, 21 Jan 2024 17:34:08 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/post_exploitation/iam_persistence/ Run Shell Commands on EC2 with Send Command or Session Manager Leverage privileged access in an AWS account to run arbitrary commands on an EC2 instance.https://hackingthe.cloud/aws/post_exploitation/run_shell_commands_on_ec2/ Sun, 21 Jan 2024 17:27:28 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/post_exploitation/run_shell_commands_on_ec2/ Modify GuardDuty Configuration Modify existing GuardDuty configurations in the target account to hinder alerting and remediation capabilities.https://hackingthe.cloud/aws/avoiding-detection/modify-guardduty-config/ Sun, 21 Jan 2024 17:20:20 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/avoiding-detection/modify-guardduty-config/ AWS API Call Hijacking via ACM-PCA By modifying the route53 entries and utilizing the acm-pca private CA one can hijack the calls to AWS API inside the AWS VPChttps://hackingthe.cloud/aws/exploitation/route53_modification_privilege_escalation/ Sat, 13 Jan 2024 20:48:37 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/route53_modification_privilege_escalation/ Get Account ID from AWS Access Keys Techniques to enumerate the account ID associated with an AWS access key.https://hackingthe.cloud/aws/enumeration/get-account-id-from-keys/ Sat, 13 Jan 2024 01:04:53 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/enumeration/get-account-id-from-keys/ Misconfigured Resource-Based Policies Common misconfigurations of resource-based policies and how they can be abused.https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/ Thu, 11 Jan 2024 08:57:50 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/ Bypass Cognito Account Enumeration Controls Leverage a flaw in Cognito's API to enumerate accounts in User Pools.https://hackingthe.cloud/aws/enumeration/bypass_cognito_user_enumeration_controls/ Mon, 08 Jan 2024 15:03:16 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/enumeration/bypass_cognito_user_enumeration_controls/ Abusing Unintended Self-Signup in AWS Cognito How to take advantage of misconfigured Amazon Cognito User Pools.https://hackingthe.cloud/aws/exploitation/cognito_user_self_signup/ Sat, 06 Jan 2024 22:14:28 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/cognito_user_self_signup/ Abusing Overpermissioned AWS Cognito Identity Pools How to take advantage of misconfigured Amazon Cognito Identity Pools.https://hackingthe.cloud/aws/exploitation/cognito_identity_pool_excessive_privileges/ Sat, 06 Jan 2024 20:43:40 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/cognito_identity_pool_excessive_privileges/ IAM unique identifiers Chart of the IAM unique ID prefixes.https://hackingthe.cloud/aws/general-knowledge/iam-key-identifiers/ Thu, 04 Jan 2024 04:45:39 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/general-knowledge/iam-key-identifiers/ DNS and CloudFront Domain Takeover via Deleted S3 Buckets How orphaned Route53 records and CloudFront distributions can be taken over if the backing S3 bucket is deleted.https://hackingthe.cloud/aws/exploitation/orphaned_cloudfront_or_dns_takeover_via_s3/ Tue, 26 Dec 2023 20:35:31 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/orphaned_cloudfront_or_dns_takeover_via_s3/ Data Exfiltration through S3 Server Access Logs Exfiltrate data via S3:GetObject and S3 server access logs.https://hackingthe.cloud/aws/exploitation/s3_server_access_logs/ Fri, 08 Dec 2023 02:37:35 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/s3_server_access_logs/ Whoami - Get Principal Name From Keys During an assessment you may find AWS IAM credentials. Use these tactics to identify the principal of the keys.https://hackingthe.cloud/aws/enumeration/whoami/ Sun, 05 Nov 2023 18:14:01 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/enumeration/whoami/ Bypass Credential Exfiltration Detection When stealing IAM credentials from an EC2 instance you can avoid a GuardDuty detection by using VPC Endpoints.https://hackingthe.cloud/aws/avoiding-detection/steal-keys-undetected/ Wed, 18 Oct 2023 00:06:37 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/avoiding-detection/steal-keys-undetected/ Survive Access Key Deletion with sts:GetFederationToken Use sts:GetFederationToken to maintain access, even if the original IAM credentials are revoked.https://hackingthe.cloud/aws/post_exploitation/survive_access_key_deletion_with_sts_getfederationtoken/ Mon, 25 Sep 2023 13:24:44 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/post_exploitation/survive_access_key_deletion_with_sts_getfederationtoken/ Download Tools and Exfiltrate Data with the AWS CLI Using the AWS CLI as a LOLScript to download and exfiltrate data.https://hackingthe.cloud/aws/post_exploitation/download_tools_and_exfiltrate_data_with_aws_cli/ Sat, 15 Jul 2023 15:12:33 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/post_exploitation/download_tools_and_exfiltrate_data_with_aws_cli/ Unauthenticated Enumeration of Azure Active Directory Email Addresses Discover how to exploit information disclosure configurations in Azure Active Directory to enumerate valid email addresses.https://hackingthe.cloud/azure/enum_email_addresses/ Wed, 12 Apr 2023 00:53:02 +0000Hacking The Cloudhttps://hackingthe.cloud/azure/enum_email_addresses/ Unauthenticated Enumeration of Google Workspace Email Addresses Discover how to exploit information disclosure configurations in Google Workspace to enumerate valid email addresses.https://hackingthe.cloud/gcp/enumeration/enum_email_addresses/ Wed, 12 Apr 2023 00:53:02 +0000Hacking The Cloudhttps://hackingthe.cloud/gcp/enumeration/enum_email_addresses/ S3 Streaming Copy Utilizng standard out to standard in with aws-cli utilizing multiple profiles to avoid logging and detection in a victim environmenthttps://hackingthe.cloud/aws/exploitation/s3_streaming_copy/ Fri, 17 Feb 2023 04:07:33 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/s3_streaming_copy/ S3 File ACL Persistence Maintain access to S3 resources by configuring Access Control Lists associated with S3 Buckets or Objects.https://hackingthe.cloud/aws/post_exploitation/s3_acl_persistence/ Thu, 26 Jan 2023 01:07:28 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/post_exploitation/s3_acl_persistence/ GCP Goat GCP Goat is the Vulnerable application for learning the GCP Securityhttps://hackingthe.cloud/gcp/capture_the_flag/gcp-goat/ Fri, 13 Jan 2023 23:48:44 +0000Hacking The Cloudhttps://hackingthe.cloud/gcp/capture_the_flag/gcp-goat/ Privilege Escalation in Google Cloud Platform Privilege escalation techniques for Google Cloud Platform (GCP)https://hackingthe.cloud/gcp/exploitation/gcp_iam_privilege_escalation/ Fri, 13 Jan 2023 23:48:44 +0000Hacking The Cloudhttps://hackingthe.cloud/gcp/exploitation/gcp_iam_privilege_escalation/ Hunting GCP Buckets How to find valid and invalid GCP Buckets using toolshttps://hackingthe.cloud/gcp/general-knowledge/gcp-buckets/ Fri, 13 Jan 2023 23:48:44 +0000Hacking The Cloudhttps://hackingthe.cloud/gcp/general-knowledge/gcp-buckets/ Bypass GuardDuty Tor Client Findings Connect to the Tor network from an EC2 instance without alerting GuardDuty.https://hackingthe.cloud/aws/avoiding-detection/guardduty-tor-client/ Mon, 09 Jan 2023 03:01:49 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/avoiding-detection/guardduty-tor-client/ Brute Force IAM Permissions Brute force the IAM permissions of a user or role to see what you have access to.https://hackingthe.cloud/aws/enumeration/brute_force_iam_permissions/ Wed, 28 Dec 2022 18:47:24 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/enumeration/brute_force_iam_permissions/ Enumerate AWS Account ID from an EC2 Instance With access to an ec2 instance, you will be able to identify the AWS account it runs in.https://hackingthe.cloud/aws/enumeration/account_id_from_ec2/ Fri, 02 Dec 2022 02:06:36 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/enumeration/account_id_from_ec2/ Introduction to the Instance Metadata Service An introduction to the Instance Metadata Service and how to access it.https://hackingthe.cloud/aws/general-knowledge/intro_metadata_service/ Fri, 02 Dec 2022 02:06:36 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/general-knowledge/intro_metadata_service/ Introduction to User Data An introduction to EC2 User Data and how to access it.https://hackingthe.cloud/aws/general-knowledge/introduction_user_data/ Fri, 02 Dec 2022 02:06:36 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/general-knowledge/introduction_user_data/ Thunder CTF GCP themed CTFhttps://hackingthe.cloud/gcp/capture_the_flag/thunder_ctf/ Fri, 02 Dec 2022 02:06:36 +0000Hacking The Cloudhttps://hackingthe.cloud/gcp/capture_the_flag/thunder_ctf/ Enumerate Service Account Permissions Brute force the permissions of a service account to see what you have access to.https://hackingthe.cloud/gcp/enumeration/enumerate_service_account_permissions/ Fri, 02 Dec 2022 02:06:36 +0000Hacking The Cloudhttps://hackingthe.cloud/gcp/enumeration/enumerate_service_account_permissions/ Default Account Information Default information on how accounts and service accounts exist in GCPhttps://hackingthe.cloud/gcp/general-knowledge/default-account-names/ Fri, 02 Dec 2022 02:06:36 +0000Hacking The Cloudhttps://hackingthe.cloud/gcp/general-knowledge/default-account-names/ Metadata in Google Cloud Instances Information about the data an attacker can access via GCP's API endpointshttps://hackingthe.cloud/gcp/general-knowledge/metadata_in_google_cloud_instances/ Fri, 02 Dec 2022 02:06:36 +0000Hacking The Cloudhttps://hackingthe.cloud/gcp/general-knowledge/metadata_in_google_cloud_instances/ Security and Constraints Security considerations and constraints that are unique to GCPhttps://hackingthe.cloud/gcp/general-knowledge/security-and-constraints/ Fri, 02 Dec 2022 02:06:36 +0000Hacking The Cloudhttps://hackingthe.cloud/gcp/general-knowledge/security-and-constraints/ \ No newline at end of file + Hacking The CloudThe encyclopedia for offensive security in the cloud.https://hackingthe.cloud/https://github.com/Hacking-the-Cloud/hackingthe.clouden Wed, 30 Oct 2024 22:46:02 -0000 Wed, 30 Oct 2024 22:46:02 -0000 1440 MkDocs RSS plugin - v1.16.0 DNS and CloudFront Domain Takeover via Deleted S3 Buckets How orphaned Route53 records and CloudFront distributions can be taken over if the backing S3 bucket is deleted.https://hackingthe.cloud/aws/exploitation/orphaned_cloudfront_or_dns_takeover_via_s3/ Wed, 30 Oct 2024 21:58:21 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/orphaned_cloudfront_or_dns_takeover_via_s3/ Run Command Abuse Utilise Azure RunCommands for execution and lateral movement.https://hackingthe.cloud/azure/run-command-abuse/ Sat, 05 Oct 2024 05:04:44 +0000Hacking The Cloudhttps://hackingthe.cloud/azure/run-command-abuse/ Exploiting Misconfigured GitLab OIDC AWS IAM Roles Discover how to identify and exploit misconfigured AWS IAM roles using GitLab OIDC, with a detailed, step-by-step guide.https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/exploiting_misconfigured_gitlab_oidc_aws_iam_roles/ Sun, 01 Sep 2024 22:56:49 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/exploiting_misconfigured_gitlab_oidc_aws_iam_roles/ CVE-2024-28056: Exploit an AWS Amplify Vulnerability in Same-Account Scenarios An in-depth explanation of how to still abuse CVE-2024-28056, a vulnerability in AWS Amplify that exposed IAM roles to takeover.https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/exploit_amplify_vulnerability_in_same_account_scenario/ Tue, 20 Aug 2024 13:46:12 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/exploit_amplify_vulnerability_in_same_account_scenario/ Steal IAM Credentials and Event Data from Lambda Leverage file read and SSRF vulnerabilities to steam IAM credentials and event data from Lambda.https://hackingthe.cloud/aws/exploitation/lambda-steal-iam-credentials/ Tue, 20 Aug 2024 01:29:51 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/lambda-steal-iam-credentials/ Abusing Misconfigured Role Trust Policies with a Wildcard Principal How to take advantage of misconfigured role trust policies that have wildcard principals.https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/misconfigured_iam_role_trust_policy_wildcard_principal/ Sun, 04 Aug 2024 21:24:46 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/misconfigured_iam_role_trust_policy_wildcard_principal/ Prevent Expensive AWS API Actions with SCPs Avoid AWS bill surprises by blocking known-expensive API calls with an SCP.https://hackingthe.cloud/aws/general-knowledge/block-expensive-actions-with-scps/ Tue, 30 Jul 2024 15:11:00 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/general-knowledge/block-expensive-actions-with-scps/ Enumerate Org/Folder/Project Permissions + Individual Resource Permissions Brute force the permissions of all resources above to see what permissions you have. Includes example of brute forcing ~9500 permissions at the end. Also introduces tool that passively collections permissions allowed as run (gcpwn)https://hackingthe.cloud/gcp/enumeration/enumerate_all_permissions/ Sun, 14 Jul 2024 21:50:00 +0000Hacking The Cloudhttps://hackingthe.cloud/gcp/enumeration/enumerate_all_permissions/ Abusing Managed Identities Abusing Managed Identitieshttps://hackingthe.cloud/azure/abusing-managed-identities/ Sat, 15 Jun 2024 06:21:29 +0000Hacking The Cloudhttps://hackingthe.cloud/azure/abusing-managed-identities/ Discover secrets in public AMIs How to find public AMIs and get stored secrets.https://hackingthe.cloud/aws/enumeration/discover_secrets_in_public_aims/ Wed, 29 May 2024 03:08:56 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/enumeration/discover_secrets_in_public_aims/ Unauthenticated Enumeration of IAM Users and Roles Discover how to exploit cross-account behaviors to enumerate IAM users and roles in another AWS account without authentication.https://hackingthe.cloud/aws/enumeration/enum_iam_user_role/ Tue, 28 May 2024 14:52:34 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/enumeration/enum_iam_user_role/ Enumerate Root User Email Address from the AWS Console Identify if an email address belongs to the root user of an AWS account.https://hackingthe.cloud/aws/enumeration/enumerate_root_email_from_console/ Tue, 21 May 2024 20:10:23 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/enumeration/enumerate_root_email_from_console/ Enumerate AWS Account ID from a Public S3 Bucket Knowing only the name of a public S3 bucket, you can ascertain the account ID it resides in.https://hackingthe.cloud/aws/enumeration/account_id_from_s3_bucket/ Sun, 14 Apr 2024 19:40:37 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/enumeration/account_id_from_s3_bucket/ AWS Organizations Defaults & Pivoting How to abuse AWS Organizations' default behavior and lateral movement capabilities.https://hackingthe.cloud/aws/general-knowledge/aws_organizations_defaults/ Thu, 07 Mar 2024 02:17:49 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/general-knowledge/aws_organizations_defaults/ Anonymous Blob Access Finding and accessing files stored in Azure Storage Accounts without authentication.https://hackingthe.cloud/azure/anonymous-blob-access/ Thu, 07 Mar 2024 02:17:49 +0000Hacking The Cloudhttps://hackingthe.cloud/azure/anonymous-blob-access/ Soft Deleted Blobs Recovering and accessing files in private Storage Accounts that have been deleted.https://hackingthe.cloud/azure/soft-deleted-blobs/ Thu, 07 Mar 2024 02:17:49 +0000Hacking The Cloudhttps://hackingthe.cloud/azure/soft-deleted-blobs/ Hacking The Cloud The encyclopedia for offensive security in the cloudhttps://hackingthe.cloud/ Mon, 19 Feb 2024 21:07:18 +0000Hacking The Cloudhttps://hackingthe.cloud/ Bypass GuardDuty Pentest Findings Prevent Kali Linux, ParrotOS, and Pentoo Linux from throwing GuardDuty alerts by modifying the User Agent string.https://hackingthe.cloud/aws/avoiding-detection/guardduty-pentest/ Mon, 19 Feb 2024 21:07:18 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/avoiding-detection/guardduty-pentest/ CI/CDon't An AWS/GitLab CICD themed CTF.https://hackingthe.cloud/aws/capture_the_flag/cicdont/ Mon, 19 Feb 2024 21:07:18 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/capture_the_flag/cicdont/ [Deprecated] Enumerate Permissions without Logging to CloudTrail Leverage a bug in the AWS API to enumerate permissions for a role without logging to CloudTrail and alerting the Blue Team.https://hackingthe.cloud/aws/deprecated/stealth_perm_enum/ Mon, 19 Feb 2024 21:07:18 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/deprecated/stealth_perm_enum/ Loot Public EBS Snapshots How to find and take advantage of exposed EBS snapshots.https://hackingthe.cloud/aws/enumeration/loot_public_ebs_snapshots/ Mon, 19 Feb 2024 21:07:18 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/enumeration/loot_public_ebs_snapshots/ Abusing Elastic Container Registry for Lateral Movement With ECR permissions you can easily distribute a backdoor to production servers, developer's laptops, or CI/CD pipelines and own the environment by gaining privileged permissions.https://hackingthe.cloud/aws/exploitation/abusing-container-registry/ Mon, 19 Feb 2024 21:07:18 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/abusing-container-registry/ Steal EC2 Metadata Credentials via SSRF Old faithful; How to steal IAM Role credentials from the EC2 Metadata service via SSRF.https://hackingthe.cloud/aws/exploitation/ec2-metadata-ssrf/ Mon, 19 Feb 2024 21:07:18 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/ec2-metadata-ssrf/ AWS IAM Privilege Escalation Techniques Common techniques that can be leveraged to escalate privileges in an AWS account.https://hackingthe.cloud/aws/exploitation/iam_privilege_escalation/ Mon, 19 Feb 2024 21:07:18 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/iam_privilege_escalation/ Exfiltrating S3 Data with Bucket Replication Policies Backdooring S3 buckets with Bucket Replication Policies.https://hackingthe.cloud/aws/exploitation/s3-bucket-replication-exfiltration/ Mon, 19 Feb 2024 21:07:18 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/s3-bucket-replication-exfiltration/ Abusing Misconfigured ECR Resource Policies How to take advantage of misconfigured AWS ECR private repositories.https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/misconfigured_ecr_resource_policy/ Mon, 19 Feb 2024 21:07:18 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/misconfigured_ecr_resource_policy/ Connection Tracking Abuse security group connection tracking to maintain persistence even when security group rules are changed.https://hackingthe.cloud/aws/general-knowledge/connection-tracking/ Mon, 19 Feb 2024 21:07:18 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/general-knowledge/connection-tracking/ Using Stolen IAM Credentials How to work with stolen IAM credentials and things to consider.https://hackingthe.cloud/aws/general-knowledge/using_stolen_iam_credentials/ Mon, 19 Feb 2024 21:07:18 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/general-knowledge/using_stolen_iam_credentials/ Create a Console Session from IAM Credentials How to use IAM credentials to create an AWS Console session.https://hackingthe.cloud/aws/post_exploitation/create_a_console_session_from_iam_credentials/ Mon, 19 Feb 2024 21:07:18 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/post_exploitation/create_a_console_session_from_iam_credentials/ Intercept SSM Communications With access to an EC2 instance you can intercept, modify, and spoof SSM communications.https://hackingthe.cloud/aws/post_exploitation/intercept_ssm_communications/ Mon, 19 Feb 2024 21:07:18 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/post_exploitation/intercept_ssm_communications/ Lambda Persistence How to establish persistence on a Lambda function after getting remote code execution.https://hackingthe.cloud/aws/post_exploitation/lambda_persistence/ Mon, 19 Feb 2024 21:07:18 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/post_exploitation/lambda_persistence/ User Data Script Persistence Maintain access to an EC2 instance and it's IAM role via user data scripts.https://hackingthe.cloud/aws/post_exploitation/user_data_script_persistence/ Mon, 19 Feb 2024 21:07:18 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/post_exploitation/user_data_script_persistence/ 2022 Wrap-up An end of year summary for Hacking the Cloud in 2022.https://hackingthe.cloud/blog/2022_wrap-up/ Mon, 19 Feb 2024 21:07:18 +0000Hacking The Cloudhttps://hackingthe.cloud/blog/2022_wrap-up/ 2023 Wrap-up An end of year summary for Hacking the Cloud in 2023.https://hackingthe.cloud/blog/2023_wrap-up/ Mon, 19 Feb 2024 21:07:18 +0000Hacking The Cloudhttps://hackingthe.cloud/blog/2023_wrap-up/ Hacking The Cloud v2: New Look All about the new look for Hacking The Cloud v2.https://hackingthe.cloud/blog/v2_new_look/ Mon, 19 Feb 2024 21:07:18 +0000Hacking The Cloudhttps://hackingthe.cloud/blog/v2_new_look/ Terraform ANSI Escape Using ANSI Escape Sequences to Hide Malicious Terraform Codehttps://hackingthe.cloud/terraform/terraform_ansi_escape_evasion/ Mon, 19 Feb 2024 21:07:18 +0000Hacking The Cloudhttps://hackingthe.cloud/terraform/terraform_ansi_escape_evasion/ Terraform Enterprise: Attack the Metadata Service Leverage a default configuration in Terraform Enterprise to steal credentials from the Metadata Servicehttps://hackingthe.cloud/terraform/terraform_enterprise_metadata_service/ Mon, 19 Feb 2024 21:07:18 +0000Hacking The Cloudhttps://hackingthe.cloud/terraform/terraform_enterprise_metadata_service/ Derive a Principal ARN from an AWS Unique Identifier How to convert an unique identifier to a principal ARN.https://hackingthe.cloud/aws/enumeration/enumerate_principal_arn_from_unique_id/ Thu, 15 Feb 2024 03:00:00 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/enumeration/enumerate_principal_arn_from_unique_id/ Get IAM Credentials from a Console Session Convert access to the AWS Console into IAM credentials.https://hackingthe.cloud/aws/post_exploitation/get_iam_creds_from_console_session/ Wed, 14 Feb 2024 03:21:21 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/post_exploitation/get_iam_creds_from_console_session/ Role Chain Juggling Keep your access by chaining assume-role calls.https://hackingthe.cloud/aws/post_exploitation/role-chain-juggling/ Fri, 09 Feb 2024 02:49:21 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/post_exploitation/role-chain-juggling/ [Deprecated] Whoami - Get Principal Name From Keys During an assessment you may find AWS IAM credentials. Use these tactics to identify the principal of the keys.https://hackingthe.cloud/aws/deprecated/whoami/ Fri, 02 Feb 2024 00:17:34 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/deprecated/whoami/ EC2 Privilege Escalation Through User Data How to escalate privileges on an EC2 instance by abusing user data.https://hackingthe.cloud/aws/exploitation/local_ec2_priv_esc_through_user_data/ Tue, 23 Jan 2024 00:25:07 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/local_ec2_priv_esc_through_user_data/ AWS IAM Persistence Methods A catalog of methods to maintain access to the AWS control plane.https://hackingthe.cloud/aws/post_exploitation/iam_persistence/ Sun, 21 Jan 2024 17:34:08 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/post_exploitation/iam_persistence/ Run Shell Commands on EC2 with Send Command or Session Manager Leverage privileged access in an AWS account to run arbitrary commands on an EC2 instance.https://hackingthe.cloud/aws/post_exploitation/run_shell_commands_on_ec2/ Sun, 21 Jan 2024 17:27:28 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/post_exploitation/run_shell_commands_on_ec2/ Modify GuardDuty Configuration Modify existing GuardDuty configurations in the target account to hinder alerting and remediation capabilities.https://hackingthe.cloud/aws/avoiding-detection/modify-guardduty-config/ Sun, 21 Jan 2024 17:20:20 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/avoiding-detection/modify-guardduty-config/ AWS API Call Hijacking via ACM-PCA By modifying the route53 entries and utilizing the acm-pca private CA one can hijack the calls to AWS API inside the AWS VPChttps://hackingthe.cloud/aws/exploitation/route53_modification_privilege_escalation/ Sat, 13 Jan 2024 20:48:37 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/route53_modification_privilege_escalation/ Get Account ID from AWS Access Keys Techniques to enumerate the account ID associated with an AWS access key.https://hackingthe.cloud/aws/enumeration/get-account-id-from-keys/ Sat, 13 Jan 2024 01:04:53 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/enumeration/get-account-id-from-keys/ Misconfigured Resource-Based Policies Common misconfigurations of resource-based policies and how they can be abused.https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/ Thu, 11 Jan 2024 08:57:50 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/ Bypass Cognito Account Enumeration Controls Leverage a flaw in Cognito's API to enumerate accounts in User Pools.https://hackingthe.cloud/aws/enumeration/bypass_cognito_user_enumeration_controls/ Mon, 08 Jan 2024 15:03:16 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/enumeration/bypass_cognito_user_enumeration_controls/ Abusing Unintended Self-Signup in AWS Cognito How to take advantage of misconfigured Amazon Cognito User Pools.https://hackingthe.cloud/aws/exploitation/cognito_user_self_signup/ Sat, 06 Jan 2024 22:14:28 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/cognito_user_self_signup/ Abusing Overpermissioned AWS Cognito Identity Pools How to take advantage of misconfigured Amazon Cognito Identity Pools.https://hackingthe.cloud/aws/exploitation/cognito_identity_pool_excessive_privileges/ Sat, 06 Jan 2024 20:43:40 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/cognito_identity_pool_excessive_privileges/ IAM unique identifiers Chart of the IAM unique ID prefixes.https://hackingthe.cloud/aws/general-knowledge/iam-key-identifiers/ Thu, 04 Jan 2024 04:45:39 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/general-knowledge/iam-key-identifiers/ Data Exfiltration through S3 Server Access Logs Exfiltrate data via S3:GetObject and S3 server access logs.https://hackingthe.cloud/aws/exploitation/s3_server_access_logs/ Fri, 08 Dec 2023 02:37:35 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/s3_server_access_logs/ Whoami - Get Principal Name From Keys During an assessment you may find AWS IAM credentials. Use these tactics to identify the principal of the keys.https://hackingthe.cloud/aws/enumeration/whoami/ Sun, 05 Nov 2023 18:14:01 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/enumeration/whoami/ Bypass Credential Exfiltration Detection When stealing IAM credentials from an EC2 instance you can avoid a GuardDuty detection by using VPC Endpoints.https://hackingthe.cloud/aws/avoiding-detection/steal-keys-undetected/ Wed, 18 Oct 2023 00:06:37 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/avoiding-detection/steal-keys-undetected/ Survive Access Key Deletion with sts:GetFederationToken Use sts:GetFederationToken to maintain access, even if the original IAM credentials are revoked.https://hackingthe.cloud/aws/post_exploitation/survive_access_key_deletion_with_sts_getfederationtoken/ Mon, 25 Sep 2023 13:24:44 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/post_exploitation/survive_access_key_deletion_with_sts_getfederationtoken/ Download Tools and Exfiltrate Data with the AWS CLI Using the AWS CLI as a LOLScript to download and exfiltrate data.https://hackingthe.cloud/aws/post_exploitation/download_tools_and_exfiltrate_data_with_aws_cli/ Sat, 15 Jul 2023 15:12:33 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/post_exploitation/download_tools_and_exfiltrate_data_with_aws_cli/ Unauthenticated Enumeration of Azure Active Directory Email Addresses Discover how to exploit information disclosure configurations in Azure Active Directory to enumerate valid email addresses.https://hackingthe.cloud/azure/enum_email_addresses/ Wed, 12 Apr 2023 00:53:02 +0000Hacking The Cloudhttps://hackingthe.cloud/azure/enum_email_addresses/ Unauthenticated Enumeration of Google Workspace Email Addresses Discover how to exploit information disclosure configurations in Google Workspace to enumerate valid email addresses.https://hackingthe.cloud/gcp/enumeration/enum_email_addresses/ Wed, 12 Apr 2023 00:53:02 +0000Hacking The Cloudhttps://hackingthe.cloud/gcp/enumeration/enum_email_addresses/ S3 Streaming Copy Utilizng standard out to standard in with aws-cli utilizing multiple profiles to avoid logging and detection in a victim environmenthttps://hackingthe.cloud/aws/exploitation/s3_streaming_copy/ Fri, 17 Feb 2023 04:07:33 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/s3_streaming_copy/ S3 File ACL Persistence Maintain access to S3 resources by configuring Access Control Lists associated with S3 Buckets or Objects.https://hackingthe.cloud/aws/post_exploitation/s3_acl_persistence/ Thu, 26 Jan 2023 01:07:28 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/post_exploitation/s3_acl_persistence/ GCP Goat GCP Goat is the Vulnerable application for learning the GCP Securityhttps://hackingthe.cloud/gcp/capture_the_flag/gcp-goat/ Fri, 13 Jan 2023 23:48:44 +0000Hacking The Cloudhttps://hackingthe.cloud/gcp/capture_the_flag/gcp-goat/ Privilege Escalation in Google Cloud Platform Privilege escalation techniques for Google Cloud Platform (GCP)https://hackingthe.cloud/gcp/exploitation/gcp_iam_privilege_escalation/ Fri, 13 Jan 2023 23:48:44 +0000Hacking The Cloudhttps://hackingthe.cloud/gcp/exploitation/gcp_iam_privilege_escalation/ Hunting GCP Buckets How to find valid and invalid GCP Buckets using toolshttps://hackingthe.cloud/gcp/general-knowledge/gcp-buckets/ Fri, 13 Jan 2023 23:48:44 +0000Hacking The Cloudhttps://hackingthe.cloud/gcp/general-knowledge/gcp-buckets/ Bypass GuardDuty Tor Client Findings Connect to the Tor network from an EC2 instance without alerting GuardDuty.https://hackingthe.cloud/aws/avoiding-detection/guardduty-tor-client/ Mon, 09 Jan 2023 03:01:49 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/avoiding-detection/guardduty-tor-client/ Brute Force IAM Permissions Brute force the IAM permissions of a user or role to see what you have access to.https://hackingthe.cloud/aws/enumeration/brute_force_iam_permissions/ Wed, 28 Dec 2022 18:47:24 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/enumeration/brute_force_iam_permissions/ Enumerate AWS Account ID from an EC2 Instance With access to an ec2 instance, you will be able to identify the AWS account it runs in.https://hackingthe.cloud/aws/enumeration/account_id_from_ec2/ Fri, 02 Dec 2022 02:06:36 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/enumeration/account_id_from_ec2/ Introduction to the Instance Metadata Service An introduction to the Instance Metadata Service and how to access it.https://hackingthe.cloud/aws/general-knowledge/intro_metadata_service/ Fri, 02 Dec 2022 02:06:36 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/general-knowledge/intro_metadata_service/ Introduction to User Data An introduction to EC2 User Data and how to access it.https://hackingthe.cloud/aws/general-knowledge/introduction_user_data/ Fri, 02 Dec 2022 02:06:36 +0000Hacking The Cloudhttps://hackingthe.cloud/aws/general-knowledge/introduction_user_data/ Thunder CTF GCP themed CTFhttps://hackingthe.cloud/gcp/capture_the_flag/thunder_ctf/ Fri, 02 Dec 2022 02:06:36 +0000Hacking The Cloudhttps://hackingthe.cloud/gcp/capture_the_flag/thunder_ctf/ Enumerate Service Account Permissions Brute force the permissions of a service account to see what you have access to.https://hackingthe.cloud/gcp/enumeration/enumerate_service_account_permissions/ Fri, 02 Dec 2022 02:06:36 +0000Hacking The Cloudhttps://hackingthe.cloud/gcp/enumeration/enumerate_service_account_permissions/ Default Account Information Default information on how accounts and service accounts exist in GCPhttps://hackingthe.cloud/gcp/general-knowledge/default-account-names/ Fri, 02 Dec 2022 02:06:36 +0000Hacking The Cloudhttps://hackingthe.cloud/gcp/general-knowledge/default-account-names/ Metadata in Google Cloud Instances Information about the data an attacker can access via GCP's API endpointshttps://hackingthe.cloud/gcp/general-knowledge/metadata_in_google_cloud_instances/ Fri, 02 Dec 2022 02:06:36 +0000Hacking The Cloudhttps://hackingthe.cloud/gcp/general-knowledge/metadata_in_google_cloud_instances/ Security and Constraints Security considerations and constraints that are unique to GCPhttps://hackingthe.cloud/gcp/general-knowledge/security-and-constraints/ Fri, 02 Dec 2022 02:06:36 +0000Hacking The Cloudhttps://hackingthe.cloud/gcp/general-knowledge/security-and-constraints/ \ No newline at end of file diff --git a/sitemap.xml b/sitemap.xml index d5c2d68be..41a9f24f2 100644 --- a/sitemap.xml +++ b/sitemap.xml @@ -2,298 +2,298 @@ https://hackingthe.cloud/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/aws/avoiding-detection/guardduty-pentest/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/aws/avoiding-detection/guardduty-tor-client/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/aws/avoiding-detection/modify-guardduty-config/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/aws/avoiding-detection/steal-keys-undetected/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/aws/capture_the_flag/cicdont/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/aws/deprecated/stealth_perm_enum/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/aws/deprecated/whoami/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/aws/enumeration/account_id_from_ec2/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/aws/enumeration/account_id_from_s3_bucket/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/aws/enumeration/brute_force_iam_permissions/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/aws/enumeration/bypass_cognito_user_enumeration_controls/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/aws/enumeration/discover_secrets_in_public_aims/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/aws/enumeration/enum_iam_user_role/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/aws/enumeration/enumerate_principal_arn_from_unique_id/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/aws/enumeration/enumerate_root_email_from_console/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/aws/enumeration/get-account-id-from-keys/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/aws/enumeration/loot_public_ebs_snapshots/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/aws/enumeration/whoami/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/aws/exploitation/abusing-container-registry/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/aws/exploitation/cognito_identity_pool_excessive_privileges/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/aws/exploitation/cognito_user_self_signup/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/aws/exploitation/ec2-metadata-ssrf/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/aws/exploitation/iam_privilege_escalation/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/aws/exploitation/lambda-steal-iam-credentials/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/aws/exploitation/local_ec2_priv_esc_through_user_data/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/aws/exploitation/orphaned_cloudfront_or_dns_takeover_via_s3/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/aws/exploitation/route53_modification_privilege_escalation/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/aws/exploitation/s3-bucket-replication-exfiltration/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/aws/exploitation/s3_server_access_logs/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/aws/exploitation/s3_streaming_copy/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/exploit_amplify_vulnerability_in_same_account_scenario/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/exploiting_misconfigured_gitlab_oidc_aws_iam_roles/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/misconfigured_ecr_resource_policy/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/misconfigured_iam_role_trust_policy_wildcard_principal/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/aws/general-knowledge/aws_organizations_defaults/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/aws/general-knowledge/block-expensive-actions-with-scps/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/aws/general-knowledge/connection-tracking/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/aws/general-knowledge/iam-key-identifiers/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/aws/general-knowledge/intro_metadata_service/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/aws/general-knowledge/introduction_user_data/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/aws/general-knowledge/using_stolen_iam_credentials/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/aws/post_exploitation/create_a_console_session_from_iam_credentials/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/aws/post_exploitation/download_tools_and_exfiltrate_data_with_aws_cli/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/aws/post_exploitation/get_iam_creds_from_console_session/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/aws/post_exploitation/iam_persistence/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/aws/post_exploitation/intercept_ssm_communications/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/aws/post_exploitation/lambda_persistence/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/aws/post_exploitation/role-chain-juggling/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/aws/post_exploitation/run_shell_commands_on_ec2/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/aws/post_exploitation/s3_acl_persistence/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/aws/post_exploitation/survive_access_key_deletion_with_sts_getfederationtoken/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/aws/post_exploitation/user_data_script_persistence/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/azure/abusing-managed-identities/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/azure/anonymous-blob-access/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/azure/enum_email_addresses/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/azure/run-command-abuse/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/azure/soft-deleted-blobs/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/blog/2022_wrap-up/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/blog/2023_wrap-up/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/blog/v2_new_look/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/gcp/capture_the_flag/gcp-goat/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/gcp/capture_the_flag/thunder_ctf/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/gcp/enumeration/enum_email_addresses/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/gcp/enumeration/enumerate_all_permissions/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/gcp/enumeration/enumerate_service_account_permissions/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/gcp/exploitation/gcp_iam_privilege_escalation/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/gcp/general-knowledge/default-account-names/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/gcp/general-knowledge/gcp-buckets/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/gcp/general-knowledge/metadata_in_google_cloud_instances/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/gcp/general-knowledge/security-and-constraints/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/terraform/terraform_ansi_escape_evasion/ - 2024-10-21 + 2024-10-30 https://hackingthe.cloud/terraform/terraform_enterprise_metadata_service/ - 2024-10-21 + 2024-10-30 \ No newline at end of file diff --git a/sitemap.xml.gz b/sitemap.xml.gz index a4f0f3112..af5ec886f 100644 Binary files a/sitemap.xml.gz and b/sitemap.xml.gz differ