Akanksha Girisecureshells.hashnode.dev·Aug 28, 2024flAWS Walkthrough Level 4 - Level 6LEVEL 4 First, I tried to directly access the URL of EC2 instance but it needed credentials. So from the description it looks like we don’t have access to EC2 but we’ve permission to take backups or snapshots of EC2 and then we can load it in our o...#flaws.cloud
Akanksha Girisecureshells.hashnode.dev·Aug 28, 2024flAWS Walkthrough Level1 - Level3LEVEL 1 In Level 1 of the flAWS challenge, we explore AWS S3 buckets and their security implications. The key goal in this level is to uncover the first sub-domain by understanding how S3 bucket permissions work and how they can be misconfigured. Le...flAWS
Goodycybgoodycyb.hashnode.dev·Jun 19, 2023Level -3: S3 Leaked Access Key SecretWelcome to Level -3. At this level, we are tasked with finding secret content in one of the S3 bucket files (“.git file"). The next level is at Level 3 link When you click on the level 3 link, you will find the list of git files as shown below on y...41 readsFlaws.CloudAWS s3
Goodycybgoodycyb.hashnode.dev·Jun 17, 2023Level 1:- Enumerating Flaws.cloud Domain (AWS)Welcome to Level 1. For this level, we are challenged to find the first sub-domain associated with flaws.cloud NB: You can click Hint 1 to view more details on how to solve the challenge. I recommend you follow the steps below before viewing the HIN...1 like·95 readsFlaws.Cloudcloud security
Abhiney SharmaforCyberSecSimplifycybersecsimplify.hashnode.dev·Jan 17, 2023Understanding Cloud PenTesting: Why it's Important & The Top 5 -GitHub Repositories to Get You StartedHere is another interesting article by CyberSecSimplify for all cloud security enthusiasts, particularly those interested in cloud pentesting. This article delves into the latest developments and trends in the field of cloud security, with a specific...1 like·353 readsResources Cloud