Skip to content

Welcome to the "Flaws in Cloud Challenge" walkthrough, where we will explore common mistakes and pitfalls when utilizing Amazon Web Services (AWS).

Notifications You must be signed in to change notification settings

goodycy3/Flaws.Cloud

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

2 Commits
Β 
Β 

Repository files navigation

Flaws.Cloud

Welcome to the "Flaws in Cloud Challenge" walkthrough, where we will explore common mistakes and pitfalls when utilizing Amazon Web Services (AWS). Unlike traditional vulnerabilities such as SQL injection, XSS, or buffer overflows, this challenge focuses primarily on AWS-specific issues. By examining these flaws, we can gain valuable knowledge about securing AWS environments effectively. Let's dive into the detailed walkthrough to understand and mitigate these vulnerabilities.

Thanks to Scott Piper (@0xdabbad00, summitroute.com) for building an amazing platform.

πŸ’‘ Check here for complete walkthrough πŸ‘ˆ

πŸš€ Level 1: Enumerating Flaws.cloud Domain (AWS)
πŸš€ Level 2: Insecure S3 Buckets (AWS)
πŸš€ Level 3: S3 Leaked Access Key Secret
πŸš€ Level 4: Exploiting Unencrypted EBS volume Snapshots
πŸš€ Level 5: Exploiting Exposed Meta-Data
πŸš€ Level 6: Auditing misconfigured IAM Account

Screenshots



REFERENCE

🚩 YouTube video by Day Cyberwox
🚩 Writeup by Will M.

About

Welcome to the "Flaws in Cloud Challenge" walkthrough, where we will explore common mistakes and pitfalls when utilizing Amazon Web Services (AWS).

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published