All Posts

CloudGoat Series #6: EC2 SSRF
For the sixth CloudGoat scenario, EC2 SSRF, we are tasked with invoking a Lambda function, which can only be done with admin rights. The start

CloudGoat Series #5: IAM Privesc by Attachment
For the fifth CloudGoat scenario, “IAM Privesc by Attachment”, we are presented with an IAM user’s access keys and are tasked with deleting an EC2

CloudGoat Series #4: Cloud Breach S3
CloudGoat’s fourth scenario, “Cloud Breach S3”, is a short and easy scenario that demonstrates abuse of the EC2 metadata service. For once, we do not

CloudGoat Series #3: Lambda Privesc
“Lambda Privesc” is CloudGoat’s third scenario, and it beings with us having an IAM user’s access keys. When we enumerate the user’s permission set, we

CloudGoat Series #2: IAM Privesc by Rollback
CloudGoat’s second scenario, titled “IAM Privesc by Rollback”, is an extremely short scenario that teaches AWS IAM policy and versioning. Once again, we’re given access

CloudGoat Series #1: Vulnerable Lambda
In this post, we’re going to walk through the first scenario of CloudGoat titled “Vulnerable Lambda”. If you don’t know what CloudGoat is or how

CloudGoat Series #0: Getting Started
CloudGoat is an open source tool (courtesy of Rhino Security Labs) that allows security professionals to create and learn from an intentionally vulnerable AWS cloud environment.

Academy Bug Bounty Hunter Path Review
I’ve recently completed the Bug Bounty Hunter job-role path on HTB Academy, which was a fun and challenging ride. Overall, I found it enjoyable and

HackTheBox Writeup: Timelapse
Today’s post is a walkthrough of the Timelapse machine from HackTheBox. This is an easy Windows machine that is set up like a domain controller.