CloudGoat: EC2 Server-side request forgery (SSRF)
This scenario, we will start as the Solus user which has ReadOnly permission on Lambda function, and the goal is invoking the lambda function.
This scenario, we will start as the Solus user which has ReadOnly permission on Lambda function, and the goal is invoking the lambda function.
In this scenaio, they provide us the kerrigan user who can list role, add and remove instance profile role. We will use these permissions to do privilege esc...
We did not get any users in this scenario, but we knew the IP Address of EC2 instance which is a misconfigured reversed proxy server. We will take credential...
This scenario, we will start with chris user who has a permission to assume roles and we have 2 two roles that we can use to grant admin access to chris.
In this scene, we will be raynor user who has permission to rollback the policy version. We will use this permission to rollback the policy that has admin ac...
In this scenario, you will start as a manager user and try to gain advantage from the compromised policies.
In this scenario, we were provided the login and signup page which used AWS Cognito Userpool as a backend to store a user data, and AWS Cognito IdentityPool ...
CloudGoat is a cybersecurity lab which created by Rhino Security Labs, allows you to learn about cloud cybersecurity by completing CTF scenarios. Learn more ...
This scenario, we will start as the Solus user which has ReadOnly permission on Lambda function, and the goal is invoking the lambda function.
In this scenaio, they provide us the kerrigan user who can list role, add and remove instance profile role. We will use these permissions to do privilege esc...
We did not get any users in this scenario, but we knew the IP Address of EC2 instance which is a misconfigured reversed proxy server. We will take credential...
This scenario, we will start with chris user who has a permission to assume roles and we have 2 two roles that we can use to grant admin access to chris.
In this scene, we will be raynor user who has permission to rollback the policy version. We will use this permission to rollback the policy that has admin ac...
In this scenario, you will start as a manager user and try to gain advantage from the compromised policies.
In this scenario, we were provided the login and signup page which used AWS Cognito Userpool as a backend to store a user data, and AWS Cognito IdentityPool ...
CloudGoat is a cybersecurity lab which created by Rhino Security Labs, allows you to learn about cloud cybersecurity by completing CTF scenarios. Learn more ...
This scenario, we will start as the Solus user which has ReadOnly permission on Lambda function, and the goal is invoking the lambda function.
In this scenaio, they provide us the kerrigan user who can list role, add and remove instance profile role. We will use these permissions to do privilege esc...
We did not get any users in this scenario, but we knew the IP Address of EC2 instance which is a misconfigured reversed proxy server. We will take credential...
This scenario, we will start with chris user who has a permission to assume roles and we have 2 two roles that we can use to grant admin access to chris.
In this scene, we will be raynor user who has permission to rollback the policy version. We will use this permission to rollback the policy that has admin ac...
In this scenario, you will start as a manager user and try to gain advantage from the compromised policies.
In this scenario, we were provided the login and signup page which used AWS Cognito Userpool as a backend to store a user data, and AWS Cognito IdentityPool ...
CloudGoat is a cybersecurity lab which created by Rhino Security Labs, allows you to learn about cloud cybersecurity by completing CTF scenarios. Learn more ...