<?xml version="1.0" encoding="UTF-8" ?> <?xml-stylesheet type="text/xsl" href="rss.xsl"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/"> <channel> <title>Hacking The Cloud</title><description>The encyclopedia for offensive security in the cloud.</description><link>https://hackingthe.cloud/</link><atom:link href="https://hackingthe.cloud/feed_rss_updated.xml" rel="self" type="application/rss+xml" /> <docs>https://github.com/Hacking-the-Cloud/hackingthe.cloud</docs><language>en</language> <pubDate>Tue, 05 May 2026 21:41:23 -0000</pubDate> <lastBuildDate>Tue, 05 May 2026 21:41:23 -0000</lastBuildDate> <ttl>1440</ttl> <generator>MkDocs RSS plugin - v1.19.0</generator> <image> <url>None</url> <title>Hacking The Cloud</title> <link>https://hackingthe.cloud/</link> </image> <item> <title>[Deprecated] Break LLM Workflows with Claude&#39;s Refusal Magic String</title> <description>How Anthropic&#39;s refusal test string can be abused to stop streaming responses and create sticky failures.</description> <link>https://hackingthe.cloud/ai-llm/deprecated/claude_magic_string_denial_of_service/</link> <pubDate>Tue, 05 May 2026 21:10:50 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/ai-llm/deprecated/claude_magic_string_denial_of_service/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/ai-llm/deprecated/claude_magic_string_denial_of_service.png" type="image/png" length="224582" /> </item> <item> <title>Bypass GuardDuty Pentest Findings via Botocore Config</title> <description>Override the default botocore user-agent string in boto3 to prevent GuardDuty PenTest findings from firing.</description> <link>https://hackingthe.cloud/aws/avoiding-detection/guardduty-pentest-botocore/</link> <pubDate>Tue, 24 Mar 2026 00:24:29 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/avoiding-detection/guardduty-pentest-botocore/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/avoiding-detection/guardduty-pentest-botocore.png" type="image/png" length="222717" /> </item> <item> <title>Obfuscated Admin IAM Policy</title> <description>Using IAM action wildcards to create policies that grant admin-equivalent access while evading name-based detections.</description> <link>https://hackingthe.cloud/aws/exploitation/obfuscated_admin_policy/</link> <pubDate>Mon, 23 Mar 2026 22:12:18 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/exploitation/obfuscated_admin_policy/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/exploitation/obfuscated_admin_policy.png" type="image/png" length="219144" /> </item> <item> <title>Detect Public Resource Exposure via Session Policy Error Messages</title> <description>Use session policy denials and verbose IAM error messages to determine if AWS resources have public resource-based policies.</description> <link>https://hackingthe.cloud/aws/enumeration/detect_public_resource_exposure_via_error_messages/</link> <pubDate>Sun, 15 Mar 2026 13:50:26 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/enumeration/detect_public_resource_exposure_via_error_messages/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/enumeration/detect_public_resource_exposure_via_error_messages.png" type="image/png" length="238783" /> </item> <item> <title>GCP Cloud Workstations Privilege Escalation</title> <description>Break out of a Cloud Workstations container through an exposed Docker socket, then access project credentials from instance metadata.</description> <link>https://hackingthe.cloud/gcp/exploitation/gcp-cloud-workstations-container-breakout/</link> <pubDate>Tue, 10 Feb 2026 03:39:26 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/gcp/exploitation/gcp-cloud-workstations-container-breakout/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/gcp/exploitation/gcp-cloud-workstations-container-breakout.png" type="image/png" length="226293" /> </item> <item> <title>Get IAM Credentials from a Console Session</title> <description>Convert access to the AWS Console into IAM credentials.</description> <link>https://hackingthe.cloud/aws/post_exploitation/get_iam_creds_from_console_session/</link> <pubDate>Mon, 02 Feb 2026 16:08:41 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/post_exploitation/get_iam_creds_from_console_session/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/post_exploitation/get_iam_creds_from_console_session.png" type="image/png" length="213914" /> </item> <item> <title>Call for research: AI and LLM security</title> <description>Hacking the Cloud is opening the door to AI and LLM security research.</description> <link>https://hackingthe.cloud/blog/call_for_ai_research/</link> <pubDate>Sun, 25 Jan 2026 20:17:53 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/blog/call_for_ai_research/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/blog/call_for_ai_research.png" type="image/png" length="207882" /> </item> <item> <title>2025 Hacking the Cloud: Year in Review</title> <description>An end of year summary for Hacking the Cloud in 2025.</description> <link>https://hackingthe.cloud/blog/2025_wrap-up/</link> <pubDate>Sun, 04 Jan 2026 21:02:59 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/blog/2025_wrap-up/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/blog/2025_wrap-up.png" type="image/png" length="208899" /> </item> <item> <title>AWS IAM Persistence Methods</title> <description>A catalog of methods to maintain access to the AWS control plane.</description> <link>https://hackingthe.cloud/aws/post_exploitation/iam_persistence/</link> <pubDate>Sun, 14 Dec 2025 13:33:00 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/post_exploitation/iam_persistence/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/post_exploitation/iam_persistence.png" type="image/png" length="213154" /> </item> <item> <title>IAM Persistence through Eventual Consistency</title> <description>Abuse IAM&#39;s eventual consistency to maintain persistence against incident response containment.</description> <link>https://hackingthe.cloud/aws/post_exploitation/iam_persistence_eventual_consistency/</link> <pubDate>Sun, 14 Dec 2025 12:53:39 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/post_exploitation/iam_persistence_eventual_consistency/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/post_exploitation/iam_persistence_eventual_consistency.png" type="image/png" length="219083" /> </item> <item> <title>Bypass Credential Exfiltration Detection</title> <description>When stealing IAM credentials from an EC2 instance you can avoid a GuardDuty detection by using VPC Endpoints.</description> <link>https://hackingthe.cloud/aws/avoiding-detection/steal-keys-undetected/</link> <pubDate>Thu, 30 Oct 2025 13:48:03 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/avoiding-detection/steal-keys-undetected/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/avoiding-detection/steal-keys-undetected.png" type="image/png" length="218406" /> </item> <item> <title>Apps Script project impersonation / Google Apps Script persistence</title> <description>Google Workspace Apps Script projects create hidden GCP projects (sys-&lt;...&gt;) that can be impersonated by attackers. This technique enables stealthy persistence (service accounts, hidden compute, cryptomining) and can bypass common console inspections.</description> <link>https://hackingthe.cloud/gcp/avoid-detection/apps-script-abuse/</link> <pubDate>Thu, 09 Oct 2025 16:09:49 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/gcp/avoid-detection/apps-script-abuse/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/gcp/avoid-detection/apps-script-abuse.png" type="image/png" length="249693" /> </item> <item> <title>AWS Network Firewall Egress Filtering Bypass</title> <description>Bypass AWS Network Firewall Egress Filtering using SNI spoofing and Host Header manipulation.</description> <link>https://hackingthe.cloud/aws/post_exploitation/network-firewall-egress-filtering-bypass/</link> <pubDate>Sun, 28 Sep 2025 20:45:11 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/post_exploitation/network-firewall-egress-filtering-bypass/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/post_exploitation/network-firewall-egress-filtering-bypass.png" type="image/png" length="218622" /> </item> <item> <title>IAM Roles Anywhere Persistence</title> <description>Abusing IAM Roles Anywhere to obtain persistent AWS access from outside the cloud.</description> <link>https://hackingthe.cloud/aws/post_exploitation/iam_roles_anywhere_persistence/</link> <pubDate>Sun, 21 Sep 2025 15:49:23 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/post_exploitation/iam_roles_anywhere_persistence/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/post_exploitation/iam_roles_anywhere_persistence.png" type="image/png" length="213850" /> </item> <item> <title>AWS CodeBuild GitHub Runner Persistence</title> <description>Abusing the CodeBuild managed GitHub Actions runner integration to obtain long‑term access to an AWS environment.</description> <link>https://hackingthe.cloud/aws/post_exploitation/codebuild_github_runner_persistence/</link> <pubDate>Sun, 21 Sep 2025 15:22:21 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/post_exploitation/codebuild_github_runner_persistence/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/post_exploitation/codebuild_github_runner_persistence.png" type="image/png" length="219463" /> </item> <item> <title>AWS IAM Privilege Escalation Techniques</title> <description>Common techniques that can be leveraged to escalate privileges in an AWS account.</description> <link>https://hackingthe.cloud/aws/exploitation/iam_privilege_escalation/</link> <pubDate>Thu, 21 Aug 2025 08:44:24 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/exploitation/iam_privilege_escalation/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/exploitation/iam_privilege_escalation.png" type="image/png" length="213278" /> </item> <item> <title>Whoami - Get Principal Name From Keys</title> <description>During an assessment you may find AWS IAM credentials. Use these tactics to identify the principal of the keys.</description> <link>https://hackingthe.cloud/aws/enumeration/whoami/</link> <pubDate>Mon, 09 Jun 2025 19:08:37 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/enumeration/whoami/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/enumeration/whoami.png" type="image/png" length="215952" /> </item> <item> <title>Enumerate services via AWS Backup</title> <description>Enumerate AWS services via AWS Backup</description> <link>https://hackingthe.cloud/aws/enumeration/enumerate_services_via_aws_backup/</link> <pubDate>Tue, 06 May 2025 06:06:53 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/enumeration/enumerate_services_via_aws_backup/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/enumeration/enumerate_services_via_aws_backup.png" type="image/png" length="206593" /> </item> <item> <title>Why Recreating an IAM Role Doesn&#39;t Restore Trust: A Gotcha in Role ARNs</title> <description>In AWS, deleting and recreating an IAM role results in a new identity that breaks existing trust policies. This behavior improves security by preventing identity spoofing but can cause failures in cross-account access and third-party integrations if not properly understood.</description> <link>https://hackingthe.cloud/aws/general-knowledge/why_recreating_an_iam_role_doesnt_restore_trust_a_gotcha_in_role_arns/</link> <pubDate>Tue, 06 May 2025 01:10:05 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/general-knowledge/why_recreating_an_iam_role_doesnt_restore_trust_a_gotcha_in_role_arns/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/general-knowledge/why_recreating_an_iam_role_doesnt_restore_trust_a_gotcha_in_role_arns.png" type="image/png" length="240080" /> </item> <item> <title>Tag Your Way In - GCP Privilege Escalation Using Tags</title> <description>A new privilege escalation technique in Google Cloud that leverages tag bindings to bypass IAM conditions and gain unauthorized access to sensitive resources.</description> <link>https://hackingthe.cloud/gcp/exploitation/tagbindings_privilege_escalation/</link> <pubDate>Fri, 02 May 2025 14:15:10 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/gcp/exploitation/tagbindings_privilege_escalation/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/gcp/exploitation/tagbindings_privilege_escalation.png" type="image/png" length="232465" /> </item> <item> <title>IAM Rogue OIDC Identity Provider Persistence</title> <description>Obtain persistence by creating a rogue OIDC Identity Provider.</description> <link>https://hackingthe.cloud/aws/post_exploitation/iam_rogue_oidc_identity_provider/</link> <pubDate>Thu, 06 Mar 2025 18:47:55 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/post_exploitation/iam_rogue_oidc_identity_provider/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/post_exploitation/iam_rogue_oidc_identity_provider.png" type="image/png" length="213664" /> </item> <item> <title>Exploiting Misconfigured Terraform Cloud OIDC AWS IAM Roles</title> <description>Discover how to identify and exploit misconfigured AWS IAM roles using Terraform Cloud OIDC</description> <link>https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/exploting_misconfigured_terraform_cloud_oidc_aws_iam_roles/</link> <pubDate>Fri, 07 Feb 2025 21:01:24 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/exploting_misconfigured_terraform_cloud_oidc_aws_iam_roles/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/exploitation/Misconfigured_Resource-Based_Policies/exploting_misconfigured_terraform_cloud_oidc_aws_iam_roles.png" type="image/png" length="218205" /> </item> <item> <title>Exploiting Misconfigured GitLab OIDC AWS IAM Roles</title> <description>Discover how to identify and exploit misconfigured AWS IAM roles using GitLab OIDC, with a detailed, step-by-step guide.</description> <link>https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/exploiting_misconfigured_gitlab_oidc_aws_iam_roles/</link> <pubDate>Fri, 07 Feb 2025 21:00:55 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/exploiting_misconfigured_gitlab_oidc_aws_iam_roles/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/exploitation/Misconfigured_Resource-Based_Policies/exploiting_misconfigured_gitlab_oidc_aws_iam_roles.png" type="image/png" length="230548" /> </item> <item> <title>Security and Constraints</title> <description>Security considerations and constraints that are unique to GCP</description> <link>https://hackingthe.cloud/gcp/general-knowledge/security-and-constraints/</link> <pubDate>Fri, 03 Jan 2025 01:03:08 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/gcp/general-knowledge/security-and-constraints/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/gcp/general-knowledge/security-and-constraints.png" type="image/png" length="207836" /> </item> <item> <title>2024 Cloud Security Highlights: Hacking the Cloud’s Year in Review</title> <description>An end of year summary for Hacking the Cloud in 2024.</description> <link>https://hackingthe.cloud/blog/2024_wrap-up/</link> <pubDate>Mon, 23 Dec 2024 15:13:39 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/blog/2024_wrap-up/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/blog/2024_wrap-up.png" type="image/png" length="219875" /> </item> <item> <title>EC2 Privilege Escalation Through User Data</title> <description>How to escalate privileges on an EC2 instance by abusing user data.</description> <link>https://hackingthe.cloud/aws/exploitation/local_ec2_priv_esc_through_user_data/</link> <pubDate>Sun, 15 Dec 2024 11:35:23 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/exploitation/local_ec2_priv_esc_through_user_data/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/exploitation/local_ec2_priv_esc_through_user_data.png" type="image/png" length="210949" /> </item> <item> <title>Run Shell Commands on EC2 with Send Command or Session Manager</title> <description>Leverage privileged access in an AWS account to run arbitrary commands on an EC2 instance.</description> <link>https://hackingthe.cloud/aws/post_exploitation/run_shell_commands_on_ec2/</link> <pubDate>Fri, 06 Dec 2024 22:32:07 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/post_exploitation/run_shell_commands_on_ec2/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/post_exploitation/run_shell_commands_on_ec2.png" type="image/png" length="224290" /> </item> <item> <title>Exploiting Public AWS Resources Programmatically - The Playbook</title> <description>A playbook on how to exploit AWS resources that can be misconfigured via resource-based policies.</description> <link>https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/exploting_public_resources_attack_playbook/</link> <pubDate>Thu, 05 Dec 2024 19:54:43 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/exploting_public_resources_attack_playbook/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/exploitation/Misconfigured_Resource-Based_Policies/exploting_public_resources_attack_playbook.png" type="image/png" length="228135" /> </item> <item> <title>[Deprecated] Enumerate Permissions without Logging to CloudTrail</title> <description>Leverage a bug in the AWS API to enumerate permissions for a role without logging to CloudTrail and alerting the Blue Team.</description> <link>https://hackingthe.cloud/aws/deprecated/stealth_perm_enum/</link> <pubDate>Thu, 21 Nov 2024 02:14:01 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/deprecated/stealth_perm_enum/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/deprecated/stealth_perm_enum.png" type="image/png" length="221746" /> </item> <item> <title>Enumerate AWS Account ID from a Public S3 Bucket</title> <description>Knowing only the name of a public S3 bucket, you can ascertain the account ID it resides in.</description> <link>https://hackingthe.cloud/aws/enumeration/account_id_from_s3_bucket/</link> <pubDate>Thu, 21 Nov 2024 02:14:01 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/enumeration/account_id_from_s3_bucket/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/enumeration/account_id_from_s3_bucket.png" type="image/png" length="218965" /> </item> <item> <title>Unauthenticated Enumeration of IAM Users and Roles</title> <description>Discover how to exploit cross-account behaviors to enumerate IAM users and roles in another AWS account without authentication.</description> <link>https://hackingthe.cloud/aws/enumeration/enum_iam_user_role/</link> <pubDate>Thu, 21 Nov 2024 02:14:01 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/enumeration/enum_iam_user_role/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/enumeration/enum_iam_user_role.png" type="image/png" length="226147" /> </item> <item> <title>Derive a Principal ARN from an AWS Unique Identifier</title> <description>How to convert an unique identifier to a principal ARN.</description> <link>https://hackingthe.cloud/aws/enumeration/enumerate_principal_arn_from_unique_id/</link> <pubDate>Thu, 21 Nov 2024 02:14:01 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/enumeration/enumerate_principal_arn_from_unique_id/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/enumeration/enumerate_principal_arn_from_unique_id.png" type="image/png" length="211460" /> </item> <item> <title>CVE-2024-28056: Exploit an AWS Amplify Vulnerability in Same-Account Scenarios</title> <description>An in-depth explanation of how to still abuse CVE-2024-28056, a vulnerability in AWS Amplify that exposed IAM roles to takeover.</description> <link>https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/exploit_amplify_vulnerability_in_same_account_scenario/</link> <pubDate>Thu, 21 Nov 2024 02:14:01 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/exploit_amplify_vulnerability_in_same_account_scenario/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/exploitation/Misconfigured_Resource-Based_Policies/exploit_amplify_vulnerability_in_same_account_scenario.png" type="image/png" length="232038" /> </item> <item> <title>Prevent Expensive AWS API Actions with SCPs</title> <description>Avoid AWS bill surprises by blocking known-expensive API calls with an SCP.</description> <link>https://hackingthe.cloud/aws/general-knowledge/block-expensive-actions-with-scps/</link> <pubDate>Thu, 21 Nov 2024 02:14:01 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/general-knowledge/block-expensive-actions-with-scps/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/general-knowledge/block-expensive-actions-with-scps.png" type="image/png" length="218223" /> </item> <item> <title>Connection Tracking</title> <description>Abuse security group connection tracking to maintain persistence even when security group rules are changed.</description> <link>https://hackingthe.cloud/aws/general-knowledge/connection-tracking/</link> <pubDate>Thu, 21 Nov 2024 02:14:01 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/general-knowledge/connection-tracking/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/general-knowledge/connection-tracking.png" type="image/png" length="209167" /> </item> <item> <title>Intercept SSM Communications</title> <description>With access to an EC2 instance you can intercept, modify, and spoof SSM communications.</description> <link>https://hackingthe.cloud/aws/post_exploitation/intercept_ssm_communications/</link> <pubDate>Thu, 21 Nov 2024 02:14:01 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/post_exploitation/intercept_ssm_communications/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/post_exploitation/intercept_ssm_communications.png" type="image/png" length="209713" /> </item> <item> <title>Bypass GuardDuty Pentest Findings for the AWS CLI</title> <description>Prevent Kali Linux, ParrotOS, and Pentoo Linux from throwing GuardDuty alerts by modifying the User Agent string when using the AWS CLI.</description> <link>https://hackingthe.cloud/aws/avoiding-detection/guardduty-pentest/</link> <pubDate>Tue, 12 Nov 2024 03:00:45 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/avoiding-detection/guardduty-pentest/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/avoiding-detection/guardduty-pentest.png" type="image/png" length="228465" /> </item> <item> <title>AWS CLI Tips and Tricks</title> <description>A collection of tips and tricks for using the AWS CLI.</description> <link>https://hackingthe.cloud/aws/general-knowledge/aws_cli_tips_and_tricks/</link> <pubDate>Mon, 04 Nov 2024 03:15:10 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/general-knowledge/aws_cli_tips_and_tricks/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/general-knowledge/aws_cli_tips_and_tricks.png" type="image/png" length="204882" /> </item> <item> <title>DNS and CloudFront Domain Takeover via Deleted S3 Buckets</title> <description>How orphaned Route53 records and CloudFront distributions can be taken over if the backing S3 bucket is deleted.</description> <link>https://hackingthe.cloud/aws/exploitation/orphaned_cloudfront_or_dns_takeover_via_s3/</link> <pubDate>Wed, 30 Oct 2024 21:58:21 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/exploitation/orphaned_cloudfront_or_dns_takeover_via_s3/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/exploitation/orphaned_cloudfront_or_dns_takeover_via_s3.png" type="image/png" length="228553" /> </item> <item> <title>Run Command Abuse</title> <description>Utilise Azure RunCommands for execution and lateral movement.</description> <link>https://hackingthe.cloud/azure/run-command-abuse/</link> <pubDate>Sat, 05 Oct 2024 05:04:44 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/azure/run-command-abuse/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/azure/run-command-abuse.png" type="image/png" length="202243" /> </item> <item> <title>Steal IAM Credentials and Event Data from Lambda</title> <description>Leverage file read and SSRF vulnerabilities to steam IAM credentials and event data from Lambda.</description> <link>https://hackingthe.cloud/aws/exploitation/lambda-steal-iam-credentials/</link> <pubDate>Tue, 20 Aug 2024 01:29:51 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/exploitation/lambda-steal-iam-credentials/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/exploitation/lambda-steal-iam-credentials.png" type="image/png" length="218733" /> </item> <item> <title>Abusing Misconfigured Role Trust Policies with a Wildcard Principal</title> <description>How to take advantage of misconfigured role trust policies that have wildcard principals.</description> <link>https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/misconfigured_iam_role_trust_policy_wildcard_principal/</link> <pubDate>Sun, 04 Aug 2024 21:24:46 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/misconfigured_iam_role_trust_policy_wildcard_principal/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/exploitation/Misconfigured_Resource-Based_Policies/misconfigured_iam_role_trust_policy_wildcard_principal.png" type="image/png" length="224794" /> </item> <item> <title>Enumerate Org/Folder/Project Permissions + Individual Resource Permissions</title> <description>Brute force the permissions of all resources above to see what permissions you have. Includes example of brute forcing ~9500 permissions at the end. Also introduces tool that passively collections permissions allowed as run (gcpwn)</description> <link>https://hackingthe.cloud/gcp/enumeration/enumerate_all_permissions/</link> <pubDate>Sun, 14 Jul 2024 21:50:00 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/gcp/enumeration/enumerate_all_permissions/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/gcp/enumeration/enumerate_all_permissions.png" type="image/png" length="231418" /> </item> <item> <title>Abusing Managed Identities</title> <description>Abusing Managed Identities</description> <link>https://hackingthe.cloud/azure/abusing-managed-identities/</link> <pubDate>Sat, 15 Jun 2024 06:21:29 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/azure/abusing-managed-identities/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/azure/abusing-managed-identities.png" type="image/png" length="200424" /> </item> <item> <title>Discover secrets in public AMIs</title> <description>How to find public AMIs and get stored secrets.</description> <link>https://hackingthe.cloud/aws/enumeration/discover_secrets_in_public_aims/</link> <pubDate>Wed, 29 May 2024 03:08:56 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/enumeration/discover_secrets_in_public_aims/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/enumeration/discover_secrets_in_public_aims.png" type="image/png" length="205391" /> </item> <item> <title>Enumerate Root User Email Address from the AWS Console</title> <description>Identify if an email address belongs to the root user of an AWS account.</description> <link>https://hackingthe.cloud/aws/enumeration/enumerate_root_email_from_console/</link> <pubDate>Tue, 21 May 2024 20:10:23 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/enumeration/enumerate_root_email_from_console/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/enumeration/enumerate_root_email_from_console.png" type="image/png" length="221738" /> </item> <item> <title>AWS Organizations Defaults &amp; Pivoting</title> <description>How to abuse AWS Organizations&#39; default behavior and lateral movement capabilities.</description> <link>https://hackingthe.cloud/aws/general-knowledge/aws_organizations_defaults/</link> <pubDate>Thu, 07 Mar 2024 02:17:49 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/general-knowledge/aws_organizations_defaults/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/general-knowledge/aws_organizations_defaults.png" type="image/png" length="216451" /> </item> <item> <title>Anonymous Blob Access</title> <description>Finding and accessing files stored in Azure Storage Accounts without authentication.</description> <link>https://hackingthe.cloud/azure/anonymous-blob-access/</link> <pubDate>Thu, 07 Mar 2024 02:17:49 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/azure/anonymous-blob-access/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/azure/anonymous-blob-access.png" type="image/png" length="210520" /> </item> <item> <title>Soft Deleted Blobs</title> <description>Recovering and accessing files in private Storage Accounts that have been deleted.</description> <link>https://hackingthe.cloud/azure/soft-deleted-blobs/</link> <pubDate>Thu, 07 Mar 2024 02:17:49 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/azure/soft-deleted-blobs/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/azure/soft-deleted-blobs.png" type="image/png" length="204832" /> </item> <item> <title>Hacking The Cloud</title> <description>The encyclopedia for offensive security in the cloud</description> <link>https://hackingthe.cloud/</link> <pubDate>Mon, 19 Feb 2024 21:07:18 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/index.png" type="image/png" length="196519" /> </item> <item> <title>CI/CDon&#39;t</title> <description>An AWS/GitLab CICD themed CTF.</description> <link>https://hackingthe.cloud/aws/capture_the_flag/cicdont/</link> <pubDate>Mon, 19 Feb 2024 21:07:18 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/capture_the_flag/cicdont/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/capture_the_flag/cicdont.png" type="image/png" length="191257" /> </item> <item> <title>Loot Public EBS Snapshots</title> <description>How to find and take advantage of exposed EBS snapshots.</description> <link>https://hackingthe.cloud/aws/enumeration/loot_public_ebs_snapshots/</link> <pubDate>Mon, 19 Feb 2024 21:07:18 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/enumeration/loot_public_ebs_snapshots/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/enumeration/loot_public_ebs_snapshots.png" type="image/png" length="201998" /> </item> <item> <title>Abusing Elastic Container Registry for Lateral Movement</title> <description>With ECR permissions you can easily distribute a backdoor to production servers, developer&#39;s laptops, or CI/CD pipelines and own the environment by gaining privileged permissions.</description> <link>https://hackingthe.cloud/aws/exploitation/abusing-container-registry/</link> <pubDate>Mon, 19 Feb 2024 21:07:18 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/exploitation/abusing-container-registry/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/exploitation/abusing-container-registry.png" type="image/png" length="235815" /> </item> <item> <title>Steal EC2 Metadata Credentials via SSRF</title> <description>Old faithful; How to steal IAM Role credentials from the EC2 Metadata service via SSRF.</description> <link>https://hackingthe.cloud/aws/exploitation/ec2-metadata-ssrf/</link> <pubDate>Mon, 19 Feb 2024 21:07:18 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/exploitation/ec2-metadata-ssrf/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/exploitation/ec2-metadata-ssrf.png" type="image/png" length="215659" /> </item> <item> <title>Exfiltrating S3 Data with Bucket Replication Policies</title> <description>Backdooring S3 buckets with Bucket Replication Policies.</description> <link>https://hackingthe.cloud/aws/exploitation/s3-bucket-replication-exfiltration/</link> <pubDate>Mon, 19 Feb 2024 21:07:18 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/exploitation/s3-bucket-replication-exfiltration/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/exploitation/s3-bucket-replication-exfiltration.png" type="image/png" length="216366" /> </item> <item> <title>Abusing Misconfigured ECR Resource Policies</title> <description>How to take advantage of misconfigured AWS ECR private repositories.</description> <link>https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/misconfigured_ecr_resource_policy/</link> <pubDate>Mon, 19 Feb 2024 21:07:18 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/misconfigured_ecr_resource_policy/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/exploitation/Misconfigured_Resource-Based_Policies/misconfigured_ecr_resource_policy.png" type="image/png" length="218172" /> </item> <item> <title>Using Stolen IAM Credentials</title> <description>How to work with stolen IAM credentials and things to consider.</description> <link>https://hackingthe.cloud/aws/general-knowledge/using_stolen_iam_credentials/</link> <pubDate>Mon, 19 Feb 2024 21:07:18 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/general-knowledge/using_stolen_iam_credentials/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/general-knowledge/using_stolen_iam_credentials.png" type="image/png" length="204242" /> </item> <item> <title>Create a Console Session from IAM Credentials</title> <description>How to use IAM credentials to create an AWS Console session.</description> <link>https://hackingthe.cloud/aws/post_exploitation/create_a_console_session_from_iam_credentials/</link> <pubDate>Mon, 19 Feb 2024 21:07:18 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/post_exploitation/create_a_console_session_from_iam_credentials/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/post_exploitation/create_a_console_session_from_iam_credentials.png" type="image/png" length="218282" /> </item> <item> <title>Lambda Persistence</title> <description>How to establish persistence on a Lambda function after getting remote code execution.</description> <link>https://hackingthe.cloud/aws/post_exploitation/lambda_persistence/</link> <pubDate>Mon, 19 Feb 2024 21:07:18 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/post_exploitation/lambda_persistence/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/post_exploitation/lambda_persistence.png" type="image/png" length="205245" /> </item> <item> <title>User Data Script Persistence</title> <description>Maintain access to an EC2 instance and it&#39;s IAM role via user data scripts.</description> <link>https://hackingthe.cloud/aws/post_exploitation/user_data_script_persistence/</link> <pubDate>Mon, 19 Feb 2024 21:07:18 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/post_exploitation/user_data_script_persistence/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/post_exploitation/user_data_script_persistence.png" type="image/png" length="209511" /> </item> <item> <title>2022 Wrap-up</title> <description>An end of year summary for Hacking the Cloud in 2022.</description> <link>https://hackingthe.cloud/blog/2022_wrap-up/</link> <pubDate>Mon, 19 Feb 2024 21:07:18 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/blog/2022_wrap-up/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/blog/2022_wrap-up.png" type="image/png" length="196908" /> </item> <item> <title>2023 Wrap-up</title> <description>An end of year summary for Hacking the Cloud in 2023.</description> <link>https://hackingthe.cloud/blog/2023_wrap-up/</link> <pubDate>Mon, 19 Feb 2024 21:07:18 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/blog/2023_wrap-up/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/blog/2023_wrap-up.png" type="image/png" length="198884" /> </item> <item> <title>Hacking The Cloud v2: New Look</title> <description>All about the new look for Hacking The Cloud v2.</description> <link>https://hackingthe.cloud/blog/v2_new_look/</link> <pubDate>Mon, 19 Feb 2024 21:07:18 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/blog/v2_new_look/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/blog/v2_new_look.png" type="image/png" length="202623" /> </item> <item> <title>Terraform ANSI Escape</title> <description>Using ANSI Escape Sequences to Hide Malicious Terraform Code</description> <link>https://hackingthe.cloud/terraform/terraform_ansi_escape_evasion/</link> <pubDate>Mon, 19 Feb 2024 21:07:18 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/terraform/terraform_ansi_escape_evasion/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/terraform/terraform_ansi_escape_evasion.png" type="image/png" length="204750" /> </item> <item> <title>Terraform Enterprise: Attack the Metadata Service</title> <description>Leverage a default configuration in Terraform Enterprise to steal credentials from the Metadata Service</description> <link>https://hackingthe.cloud/terraform/terraform_enterprise_metadata_service/</link> <pubDate>Mon, 19 Feb 2024 21:07:18 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/terraform/terraform_enterprise_metadata_service/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/terraform/terraform_enterprise_metadata_service.png" type="image/png" length="219130" /> </item> <item> <title>Role Chain Juggling</title> <description>Keep your access by chaining assume-role calls.</description> <link>https://hackingthe.cloud/aws/post_exploitation/role-chain-juggling/</link> <pubDate>Fri, 09 Feb 2024 02:49:21 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/post_exploitation/role-chain-juggling/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/post_exploitation/role-chain-juggling.png" type="image/png" length="197942" /> </item> <item> <title>[Deprecated] Whoami - Get Principal Name From Keys</title> <description>During an assessment you may find AWS IAM credentials. Use these tactics to identify the principal of the keys.</description> <link>https://hackingthe.cloud/aws/deprecated/whoami/</link> <pubDate>Fri, 02 Feb 2024 00:17:34 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/deprecated/whoami/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/deprecated/whoami.png" type="image/png" length="224366" /> </item> <item> <title>Modify GuardDuty Configuration</title> <description>Modify existing GuardDuty configurations in the target account to hinder alerting and remediation capabilities.</description> <link>https://hackingthe.cloud/aws/avoiding-detection/modify-guardduty-config/</link> <pubDate>Sun, 21 Jan 2024 17:20:20 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/avoiding-detection/modify-guardduty-config/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/avoiding-detection/modify-guardduty-config.png" type="image/png" length="214016" /> </item> <item> <title>AWS API Call Hijacking via ACM-PCA</title> <description>By modifying the route53 entries and utilizing the acm-pca private CA one can hijack the calls to AWS API inside the AWS VPC</description> <link>https://hackingthe.cloud/aws/exploitation/route53_modification_privilege_escalation/</link> <pubDate>Sat, 13 Jan 2024 20:48:37 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/exploitation/route53_modification_privilege_escalation/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/exploitation/route53_modification_privilege_escalation.png" type="image/png" length="220722" /> </item> <item> <title>Get Account ID from AWS Access Keys</title> <description>Techniques to enumerate the account ID associated with an AWS access key.</description> <link>https://hackingthe.cloud/aws/enumeration/get-account-id-from-keys/</link> <pubDate>Sat, 13 Jan 2024 01:04:53 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/enumeration/get-account-id-from-keys/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/enumeration/get-account-id-from-keys.png" type="image/png" length="213705" /> </item> <item> <title>Misconfigured Resource-Based Policies</title> <description>Common misconfigurations of resource-based policies and how they can be abused.</description> <link>https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/</link> <pubDate>Thu, 11 Jan 2024 08:57:50 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/exploitation/Misconfigured_Resource-Based_Policies/index.png" type="image/png" length="218621" /> </item> <item> <title>Bypass Cognito Account Enumeration Controls</title> <description>Leverage a flaw in Cognito&#39;s API to enumerate accounts in User Pools.</description> <link>https://hackingthe.cloud/aws/enumeration/bypass_cognito_user_enumeration_controls/</link> <pubDate>Mon, 08 Jan 2024 15:03:16 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/enumeration/bypass_cognito_user_enumeration_controls/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/enumeration/bypass_cognito_user_enumeration_controls.png" type="image/png" length="215555" /> </item> <item> <title>Abusing Unintended Self-Signup in AWS Cognito</title> <description>How to take advantage of misconfigured Amazon Cognito User Pools.</description> <link>https://hackingthe.cloud/aws/exploitation/cognito_user_self_signup/</link> <pubDate>Sat, 06 Jan 2024 22:14:28 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/exploitation/cognito_user_self_signup/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/exploitation/cognito_user_self_signup.png" type="image/png" length="216396" /> </item> <item> <title>Abusing Overpermissioned AWS Cognito Identity Pools</title> <description>How to take advantage of misconfigured Amazon Cognito Identity Pools.</description> <link>https://hackingthe.cloud/aws/exploitation/cognito_identity_pool_excessive_privileges/</link> <pubDate>Sat, 06 Jan 2024 20:43:40 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/exploitation/cognito_identity_pool_excessive_privileges/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/exploitation/cognito_identity_pool_excessive_privileges.png" type="image/png" length="222679" /> </item> <item> <title>IAM unique identifiers</title> <description>Chart of the IAM unique ID prefixes.</description> <link>https://hackingthe.cloud/aws/general-knowledge/iam-key-identifiers/</link> <pubDate>Thu, 04 Jan 2024 04:45:39 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/general-knowledge/iam-key-identifiers/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/general-knowledge/iam-key-identifiers.png" type="image/png" length="195907" /> </item> <item> <title>Data Exfiltration through S3 Server Access Logs</title> <description>Exfiltrate data via S3:GetObject and S3 server access logs.</description> <link>https://hackingthe.cloud/aws/exploitation/s3_server_access_logs/</link> <pubDate>Fri, 08 Dec 2023 02:37:35 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/exploitation/s3_server_access_logs/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/exploitation/s3_server_access_logs.png" type="image/png" length="213748" /> </item> <item> <title>Survive Access Key Deletion with sts:GetFederationToken</title> <description>Use sts:GetFederationToken to maintain access, even if the original IAM credentials are revoked.</description> <link>https://hackingthe.cloud/aws/post_exploitation/survive_access_key_deletion_with_sts_getfederationtoken/</link> <pubDate>Mon, 25 Sep 2023 13:24:44 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/post_exploitation/survive_access_key_deletion_with_sts_getfederationtoken/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/post_exploitation/survive_access_key_deletion_with_sts_getfederationtoken.png" type="image/png" length="226482" /> </item> <item> <title>Download Tools and Exfiltrate Data with the AWS CLI</title> <description>Using the AWS CLI as a LOLScript to download and exfiltrate data.</description> <link>https://hackingthe.cloud/aws/post_exploitation/download_tools_and_exfiltrate_data_with_aws_cli/</link> <pubDate>Sat, 15 Jul 2023 15:12:33 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/post_exploitation/download_tools_and_exfiltrate_data_with_aws_cli/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/post_exploitation/download_tools_and_exfiltrate_data_with_aws_cli.png" type="image/png" length="216048" /> </item> <item> <title>Unauthenticated Enumeration of Azure Active Directory Email Addresses</title> <description>Discover how to exploit information disclosure configurations in Azure Active Directory to enumerate valid email addresses.</description> <link>https://hackingthe.cloud/azure/enum_email_addresses/</link> <pubDate>Wed, 12 Apr 2023 00:53:02 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/azure/enum_email_addresses/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/azure/enum_email_addresses.png" type="image/png" length="226173" /> </item> <item> <title>Unauthenticated Enumeration of Google Workspace Email Addresses</title> <description>Discover how to exploit information disclosure configurations in Google Workspace to enumerate valid email addresses.</description> <link>https://hackingthe.cloud/gcp/enumeration/enum_email_addresses/</link> <pubDate>Wed, 12 Apr 2023 00:53:02 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/gcp/enumeration/enum_email_addresses/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/gcp/enumeration/enum_email_addresses.png" type="image/png" length="228215" /> </item> <item> <title>S3 Streaming Copy</title> <description>Utilizng standard out to standard in with aws-cli utilizing multiple profiles to avoid logging and detection in a victim environment</description> <link>https://hackingthe.cloud/aws/exploitation/s3_streaming_copy/</link> <pubDate>Fri, 17 Feb 2023 04:07:33 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/exploitation/s3_streaming_copy/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/exploitation/s3_streaming_copy.png" type="image/png" length="210758" /> </item> <item> <title>S3 File ACL Persistence</title> <description>Maintain access to S3 resources by configuring Access Control Lists associated with S3 Buckets or Objects.</description> <link>https://hackingthe.cloud/aws/post_exploitation/s3_acl_persistence/</link> <pubDate>Thu, 26 Jan 2023 01:07:28 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/post_exploitation/s3_acl_persistence/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/post_exploitation/s3_acl_persistence.png" type="image/png" length="214470" /> </item> <item> <title>GCP Goat</title> <description>GCP Goat is the Vulnerable application for learning the GCP Security</description> <link>https://hackingthe.cloud/gcp/capture_the_flag/gcp-goat/</link> <pubDate>Fri, 13 Jan 2023 23:48:44 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/gcp/capture_the_flag/gcp-goat/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/gcp/capture_the_flag/gcp-goat.png" type="image/png" length="199020" /> </item> <item> <title>Privilege Escalation in Google Cloud Platform</title> <description>Privilege escalation techniques for Google Cloud Platform (GCP)</description> <link>https://hackingthe.cloud/gcp/exploitation/gcp_iam_privilege_escalation/</link> <pubDate>Fri, 13 Jan 2023 23:48:44 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/gcp/exploitation/gcp_iam_privilege_escalation/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/gcp/exploitation/gcp_iam_privilege_escalation.png" type="image/png" length="209467" /> </item> <item> <title>Hunting GCP Buckets</title> <description>How to find valid and invalid GCP Buckets using tools</description> <link>https://hackingthe.cloud/gcp/general-knowledge/gcp-buckets/</link> <pubDate>Fri, 13 Jan 2023 23:48:44 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/gcp/general-knowledge/gcp-buckets/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/gcp/general-knowledge/gcp-buckets.png" type="image/png" length="198405" /> </item> <item> <title>Bypass GuardDuty Tor Client Findings</title> <description>Connect to the Tor network from an EC2 instance without alerting GuardDuty.</description> <link>https://hackingthe.cloud/aws/avoiding-detection/guardduty-tor-client/</link> <pubDate>Mon, 09 Jan 2023 03:01:49 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/avoiding-detection/guardduty-tor-client/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/avoiding-detection/guardduty-tor-client.png" type="image/png" length="207790" /> </item> <item> <title>Brute Force IAM Permissions</title> <description>Brute force the IAM permissions of a user or role to see what you have access to.</description> <link>https://hackingthe.cloud/aws/enumeration/brute_force_iam_permissions/</link> <pubDate>Wed, 28 Dec 2022 18:47:24 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/enumeration/brute_force_iam_permissions/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/enumeration/brute_force_iam_permissions.png" type="image/png" length="208460" /> </item> <item> <title>Enumerate AWS Account ID from an EC2 Instance</title> <description>With access to an ec2 instance, you will be able to identify the AWS account it runs in.</description> <link>https://hackingthe.cloud/aws/enumeration/account_id_from_ec2/</link> <pubDate>Fri, 02 Dec 2022 02:06:36 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/enumeration/account_id_from_ec2/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/enumeration/account_id_from_ec2.png" type="image/png" length="217556" /> </item> <item> <title>Introduction to the Instance Metadata Service</title> <description>An introduction to the Instance Metadata Service and how to access it.</description> <link>https://hackingthe.cloud/aws/general-knowledge/intro_metadata_service/</link> <pubDate>Fri, 02 Dec 2022 02:06:36 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/general-knowledge/intro_metadata_service/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/general-knowledge/intro_metadata_service.png" type="image/png" length="212000" /> </item> <item> <title>Introduction to User Data</title> <description>An introduction to EC2 User Data and how to access it.</description> <link>https://hackingthe.cloud/aws/general-knowledge/introduction_user_data/</link> <pubDate>Fri, 02 Dec 2022 02:06:36 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/aws/general-knowledge/introduction_user_data/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/aws/general-knowledge/introduction_user_data.png" type="image/png" length="203295" /> </item> <item> <title>Thunder CTF</title> <description>GCP themed CTF</description> <link>https://hackingthe.cloud/gcp/capture_the_flag/thunder_ctf/</link> <pubDate>Fri, 02 Dec 2022 02:06:36 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/gcp/capture_the_flag/thunder_ctf/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/gcp/capture_the_flag/thunder_ctf.png" type="image/png" length="186277" /> </item> <item> <title>Enumerate Service Account Permissions</title> <description>Brute force the permissions of a service account to see what you have access to.</description> <link>https://hackingthe.cloud/gcp/enumeration/enumerate_service_account_permissions/</link> <pubDate>Fri, 02 Dec 2022 02:06:36 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/gcp/enumeration/enumerate_service_account_permissions/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/gcp/enumeration/enumerate_service_account_permissions.png" type="image/png" length="210324" /> </item> <item> <title>Default Account Information</title> <description>Default information on how accounts and service accounts exist in GCP</description> <link>https://hackingthe.cloud/gcp/general-knowledge/default-account-names/</link> <pubDate>Fri, 02 Dec 2022 02:06:36 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/gcp/general-knowledge/default-account-names/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/gcp/general-knowledge/default-account-names.png" type="image/png" length="206113" /> </item> <item> <title>Metadata in Google Cloud Instances</title> <description>Information about the data an attacker can access via GCP&#39;s API endpoints</description> <link>https://hackingthe.cloud/gcp/general-knowledge/metadata_in_google_cloud_instances/</link> <pubDate>Fri, 02 Dec 2022 02:06:36 +0000</pubDate> <source url="https://hackingthe.cloud/feed_rss_updated.xml">Hacking The Cloud</source><guid isPermaLink="true">https://hackingthe.cloud/gcp/general-knowledge/metadata_in_google_cloud_instances/</guid> <enclosure url="https://hackingthe.cloud/assets/images/social/gcp/general-knowledge/metadata_in_google_cloud_instances.png" type="image/png" length="210294" /> </item> </channel> </rss>