Skip to content

Latest commit

 

History

History
23 lines (18 loc) · 2.36 KB

README.md

File metadata and controls

23 lines (18 loc) · 2.36 KB

Flaws.Cloud

Welcome to the "Flaws in Cloud Challenge" walkthrough, where we will explore common mistakes and pitfalls when utilizing Amazon Web Services (AWS). Unlike traditional vulnerabilities such as SQL injection, XSS, or buffer overflows, this challenge focuses primarily on AWS-specific issues. By examining these flaws, we can gain valuable knowledge about securing AWS environments effectively. Let's dive into the detailed walkthrough to understand and mitigate these vulnerabilities.

Thanks to Scott Piper (@0xdabbad00, summitroute.com) for building an amazing platform.

💡 Check here for complete walkthrough 👈

🚀 Level 1: Enumerating Flaws.cloud Domain (AWS)
🚀 Level 2: Insecure S3 Buckets (AWS)
🚀 Level 3: S3 Leaked Access Key Secret
🚀 Level 4: Exploiting Unencrypted EBS volume Snapshots
🚀 Level 5: Exploiting Exposed Meta-Data
🚀 Level 6: Auditing misconfigured IAM Account

Screenshots



REFERENCE

🚩 YouTube video by Day Cyberwox
🚩 Writeup by Will M.