Goodycybgoodycyb.hashnode.dev·Jun 20, 2023Level - 5: Exploiting Exposed Meta-DataWelcome to Level 5. For this level, we are given access to an EC2 instance hosting a simple HTTP proxy. The proxy allows us to access external resources through it. We are tasked with using this proxy to list the contents of the level 6 bucket level6...2 likes·37 readsFlaws.Cloudmetadata awsAdd a thoughtful commentNo comments yetBe the first to start the conversation.