Posts by Tag

cloudsecurity

CloudGoat: Cloud Breach S3

less than 1 minute read

We did not get any users in this scenario, but we knew the IP Address of EC2 instance which is a misconfigured reversed proxy server. We will take credential...

CloudGoat: Lambda Privilege Escalation

2 minute read

This scenario, we will start with chris user who has a permission to assume roles and we have 2 two roles that we can use to grant admin access to chris.

CloudGoat: Vulnerable Cognito

2 minute read

In this scenario, we were provided the login and signup page which used AWS Cognito Userpool as a backend to store a user data, and AWS Cognito IdentityPool ...

CloudGoat: Vulnerable Lambda

5 minute read

CloudGoat is a cybersecurity lab which created by Rhino Security Labs, allows you to learn about cloud cybersecurity by completing CTF scenarios. Learn more ...

Back to Top ↑

cybersecurity

CloudGoat: Cloud Breach S3

less than 1 minute read

We did not get any users in this scenario, but we knew the IP Address of EC2 instance which is a misconfigured reversed proxy server. We will take credential...

CloudGoat: Lambda Privilege Escalation

2 minute read

This scenario, we will start with chris user who has a permission to assume roles and we have 2 two roles that we can use to grant admin access to chris.

CloudGoat: Vulnerable Cognito

2 minute read

In this scenario, we were provided the login and signup page which used AWS Cognito Userpool as a backend to store a user data, and AWS Cognito IdentityPool ...

CloudGoat: Vulnerable Lambda

5 minute read

CloudGoat is a cybersecurity lab which created by Rhino Security Labs, allows you to learn about cloud cybersecurity by completing CTF scenarios. Learn more ...

Back to Top ↑

aws

CloudGoat: Cloud Breach S3

less than 1 minute read

We did not get any users in this scenario, but we knew the IP Address of EC2 instance which is a misconfigured reversed proxy server. We will take credential...

CloudGoat: Lambda Privilege Escalation

2 minute read

This scenario, we will start with chris user who has a permission to assume roles and we have 2 two roles that we can use to grant admin access to chris.

CloudGoat: Vulnerable Cognito

2 minute read

In this scenario, we were provided the login and signup page which used AWS Cognito Userpool as a backend to store a user data, and AWS Cognito IdentityPool ...

CloudGoat: Vulnerable Lambda

5 minute read

CloudGoat is a cybersecurity lab which created by Rhino Security Labs, allows you to learn about cloud cybersecurity by completing CTF scenarios. Learn more ...

Back to Top ↑