Hacking The CloudThe encyclopedia for offensive security in the cloud.https://hackingthe.cloud/ https://github.com/Hacking-the-Cloud/hackingthe.clouden Tue, 17 Mar 2026 14:09:58 -0000 Tue, 17 Mar 2026 14:09:58 -0000 1440 MkDocs RSS plugin - v1.17.9 None Hacking The Cloud https://hackingthe.cloud/ Detect Public Resource Exposure via Session Policy Error Messages Use session policy denials and verbose IAM error messages to determine if AWS resources have public resource-based policies. https://hackingthe.cloud/aws/enumeration/detect_public_resource_exposure_via_error_messages/ Sun, 15 Mar 2026 13:50:26 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/enumeration/detect_public_resource_exposure_via_error_messages/ GCP Cloud Workstations Privilege Escalation Break out of a Cloud Workstations container through an exposed Docker socket, then access project credentials from instance metadata. https://hackingthe.cloud/gcp/exploitation/gcp-cloud-workstations-container-breakout/ Mon, 09 Feb 2026 22:33:10 +0000 Hacking The Cloudhttps://hackingthe.cloud/gcp/exploitation/gcp-cloud-workstations-container-breakout/ Call for research: AI and LLM security Hacking the Cloud is opening the door to AI and LLM security research. https://hackingthe.cloud/blog/call_for_ai_research/ Sun, 25 Jan 2026 20:11:12 +0000 Hacking The Cloudhttps://hackingthe.cloud/blog/call_for_ai_research/ Break LLM Workflows with Claude's Refusal Magic String How Anthropic's refusal test string can be abused to stop streaming responses and create sticky failures. https://hackingthe.cloud/ai-llm/exploitation/claude_magic_string_denial_of_service/ Wed, 21 Jan 2026 01:18:49 +0000 Hacking The Cloudhttps://hackingthe.cloud/ai-llm/exploitation/claude_magic_string_denial_of_service/ 2025 Hacking the Cloud: Year in Review An end of year summary for Hacking the Cloud in 2025. https://hackingthe.cloud/blog/2025_wrap-up/ Sun, 04 Jan 2026 20:47:57 +0000 Hacking The Cloudhttps://hackingthe.cloud/blog/2025_wrap-up/ IAM Persistence through Eventual Consistency Abuse IAM's eventual consistency to maintain persistence against incident response containment. https://hackingthe.cloud/aws/post_exploitation/iam_persistence_eventual_consistency/ Sun, 14 Dec 2025 12:53:39 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/post_exploitation/iam_persistence_eventual_consistency/ Apps Script project impersonation / Google Apps Script persistence Google Workspace Apps Script projects create hidden GCP projects (sys-<...>) that can be impersonated by attackers. This technique enables stealthy persistence (service accounts, hidden compute, cryptomining) and can bypass common console inspections. https://hackingthe.cloud/gcp/avoid-detection/apps-script-abuse/ Wed, 08 Oct 2025 18:22:21 +0000 Hacking The Cloudhttps://hackingthe.cloud/gcp/avoid-detection/apps-script-abuse/ AWS Network Firewall Egress Filtering Bypass Bypass AWS Network Firewall Egress Filtering using SNI spoofing and Host Header manipulation. https://hackingthe.cloud/aws/post_exploitation/network-firewall-egress-filtering-bypass/ Sun, 28 Sep 2025 20:45:11 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/post_exploitation/network-firewall-egress-filtering-bypass/ IAM Roles Anywhere Persistence Abusing IAM Roles Anywhere to obtain persistent AWS access from outside the cloud. https://hackingthe.cloud/aws/post_exploitation/iam_roles_anywhere_persistence/ Sun, 21 Sep 2025 15:49:23 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/post_exploitation/iam_roles_anywhere_persistence/ AWS CodeBuild GitHub Runner Persistence Abusing the CodeBuild managed GitHub Actions runner integration to obtain long‑term access to an AWS environment. https://hackingthe.cloud/aws/post_exploitation/codebuild_github_runner_persistence/ Sun, 21 Sep 2025 15:22:21 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/post_exploitation/codebuild_github_runner_persistence/ Enumerate services via AWS Backup Enumerate AWS services via AWS Backup https://hackingthe.cloud/aws/enumeration/enumerate_services_via_aws_backup/ Tue, 06 May 2025 06:06:53 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/enumeration/enumerate_services_via_aws_backup/ Why Recreating an IAM Role Doesn't Restore Trust: A Gotcha in Role ARNs In AWS, deleting and recreating an IAM role results in a new identity that breaks existing trust policies. This behavior improves security by preventing identity spoofing but can cause failures in cross-account access and third-party integrations if not properly understood. https://hackingthe.cloud/aws/general-knowledge/why_recreating_an_iam_role_doesnt_restore_trust_a_gotcha_in_role_arns/ Mon, 05 May 2025 14:08:51 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/general-knowledge/why_recreating_an_iam_role_doesnt_restore_trust_a_gotcha_in_role_arns/ Tag Your Way In - GCP Privilege Escalation Using Tags A new privilege escalation technique in Google Cloud that leverages tag bindings to bypass IAM conditions and gain unauthorized access to sensitive resources. https://hackingthe.cloud/gcp/exploitation/tagbindings_privilege_escalation/ Fri, 02 May 2025 10:10:37 +0000 Hacking The Cloudhttps://hackingthe.cloud/gcp/exploitation/tagbindings_privilege_escalation/ IAM Rogue OIDC Identity Provider Persistence Obtain persistence by creating a rogue OIDC Identity Provider. https://hackingthe.cloud/aws/post_exploitation/iam_rogue_oidc_identity_provider/ Thu, 06 Mar 2025 14:44:42 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/post_exploitation/iam_rogue_oidc_identity_provider/ 2024 Cloud Security Highlights: Hacking the Cloud’s Year in Review An end of year summary for Hacking the Cloud in 2024. https://hackingthe.cloud/blog/2024_wrap-up/ Mon, 23 Dec 2024 00:48:06 +0000 Hacking The Cloudhttps://hackingthe.cloud/blog/2024_wrap-up/ Exploiting Misconfigured Terraform Cloud OIDC AWS IAM Roles Discover how to identify and exploit misconfigured AWS IAM roles using Terraform Cloud OIDC https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/exploting_misconfigured_terraform_cloud_oidc_aws_iam_roles/ Fri, 13 Dec 2024 12:28:24 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/exploting_misconfigured_terraform_cloud_oidc_aws_iam_roles/ Exploiting Public AWS Resources Programmatically - The Playbook A playbook on how to exploit AWS resources that can be misconfigured via resource-based policies. https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/exploting_public_resources_attack_playbook/ Thu, 05 Dec 2024 17:37:27 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/exploting_public_resources_attack_playbook/ AWS CLI Tips and Tricks A collection of tips and tricks for using the AWS CLI. https://hackingthe.cloud/aws/general-knowledge/aws_cli_tips_and_tricks/ Mon, 04 Nov 2024 03:15:10 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/general-knowledge/aws_cli_tips_and_tricks/ Run Command Abuse Utilise Azure RunCommands for execution and lateral movement. https://hackingthe.cloud/azure/run-command-abuse/ Sat, 05 Oct 2024 05:04:44 +0000 Hacking The Cloudhttps://hackingthe.cloud/azure/run-command-abuse/ Exploiting Misconfigured GitLab OIDC AWS IAM Roles Discover how to identify and exploit misconfigured AWS IAM roles using GitLab OIDC, with a detailed, step-by-step guide. https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/exploiting_misconfigured_gitlab_oidc_aws_iam_roles/ Sun, 01 Sep 2024 22:46:15 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/exploiting_misconfigured_gitlab_oidc_aws_iam_roles/ CVE-2024-28056: Exploit an AWS Amplify Vulnerability in Same-Account Scenarios An in-depth explanation of how to still abuse CVE-2024-28056, a vulnerability in AWS Amplify that exposed IAM roles to takeover. https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/exploit_amplify_vulnerability_in_same_account_scenario/ Wed, 31 Jul 2024 20:37:36 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/exploit_amplify_vulnerability_in_same_account_scenario/ Prevent Expensive AWS API Actions with SCPs Avoid AWS bill surprises by blocking known-expensive API calls with an SCP. https://hackingthe.cloud/aws/general-knowledge/block-expensive-actions-with-scps/ Tue, 30 Jul 2024 00:15:57 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/general-knowledge/block-expensive-actions-with-scps/ Enumerate Org/Folder/Project Permissions + Individual Resource Permissions Brute force the permissions of all resources above to see what permissions you have. Includes example of brute forcing ~9500 permissions at the end. Also introduces tool that passively collections permissions allowed as run (gcpwn) https://hackingthe.cloud/gcp/enumeration/enumerate_all_permissions/ Sun, 14 Jul 2024 21:08:01 +0000 Hacking The Cloudhttps://hackingthe.cloud/gcp/enumeration/enumerate_all_permissions/ Discover secrets in public AMIs How to find public AMIs and get stored secrets. https://hackingthe.cloud/aws/enumeration/discover_secrets_in_public_aims/ Tue, 28 May 2024 16:27:11 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/enumeration/discover_secrets_in_public_aims/ Enumerate Root User Email Address from the AWS Console Identify if an email address belongs to the root user of an AWS account. https://hackingthe.cloud/aws/enumeration/enumerate_root_email_from_console/ Tue, 21 May 2024 20:10:23 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/enumeration/enumerate_root_email_from_console/ Abusing Misconfigured Role Trust Policies with a Wildcard Principal How to take advantage of misconfigured role trust policies that have wildcard principals. https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/misconfigured_iam_role_trust_policy_wildcard_principal/ Mon, 29 Jan 2024 03:39:38 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/misconfigured_iam_role_trust_policy_wildcard_principal/ EC2 Privilege Escalation Through User Data How to escalate privileges on an EC2 instance by abusing user data. https://hackingthe.cloud/aws/exploitation/local_ec2_priv_esc_through_user_data/ Sun, 21 Jan 2024 17:59:06 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/local_ec2_priv_esc_through_user_data/ Bypass Cognito Account Enumeration Controls Leverage a flaw in Cognito's API to enumerate accounts in User Pools. https://hackingthe.cloud/aws/enumeration/bypass_cognito_user_enumeration_controls/ Sun, 07 Jan 2024 21:28:56 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/enumeration/bypass_cognito_user_enumeration_controls/ DNS and CloudFront Domain Takeover via Deleted S3 Buckets How orphaned Route53 records and CloudFront distributions can be taken over if the backing S3 bucket is deleted. https://hackingthe.cloud/aws/exploitation/orphaned_cloudfront_or_dns_takeover_via_s3/ Wed, 20 Dec 2023 14:50:27 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/orphaned_cloudfront_or_dns_takeover_via_s3/ 2023 Wrap-up An end of year summary for Hacking the Cloud in 2023. https://hackingthe.cloud/blog/2023_wrap-up/ Wed, 20 Dec 2023 01:25:13 +0000 Hacking The Cloudhttps://hackingthe.cloud/blog/2023_wrap-up/ Data Exfiltration through S3 Server Access Logs Exfiltrate data via S3:GetObject and S3 server access logs. https://hackingthe.cloud/aws/exploitation/s3_server_access_logs/ Thu, 07 Dec 2023 10:12:13 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/s3_server_access_logs/ Derive a Principal ARN from an AWS Unique Identifier How to convert an unique identifier to a principal ARN. https://hackingthe.cloud/aws/enumeration/enumerate_principal_arn_from_unique_id/ Mon, 20 Nov 2023 00:54:35 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/enumeration/enumerate_principal_arn_from_unique_id/ Survive Access Key Deletion with sts:GetFederationToken Use sts:GetFederationToken to maintain access, even if the original IAM credentials are revoked. https://hackingthe.cloud/aws/post_exploitation/survive_access_key_deletion_with_sts_getfederationtoken/ Mon, 25 Sep 2023 13:24:44 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/post_exploitation/survive_access_key_deletion_with_sts_getfederationtoken/ AWS IAM Persistence Methods A catalog of methods to maintain access to the AWS control plane. https://hackingthe.cloud/aws/post_exploitation/iam_persistence/ Tue, 01 Aug 2023 01:58:06 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/post_exploitation/iam_persistence/ Download Tools and Exfiltrate Data with the AWS CLI Using the AWS CLI as a LOLScript to download and exfiltrate data. https://hackingthe.cloud/aws/post_exploitation/download_tools_and_exfiltrate_data_with_aws_cli/ Thu, 13 Jul 2023 03:46:27 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/post_exploitation/download_tools_and_exfiltrate_data_with_aws_cli/ Abusing Overpermissioned AWS Cognito Identity Pools How to take advantage of misconfigured Amazon Cognito Identity Pools. https://hackingthe.cloud/aws/exploitation/cognito_identity_pool_excessive_privileges/ Tue, 20 Jun 2023 17:26:14 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/cognito_identity_pool_excessive_privileges/ Abusing Unintended Self-Signup in AWS Cognito How to take advantage of misconfigured Amazon Cognito User Pools. https://hackingthe.cloud/aws/exploitation/cognito_user_self_signup/ Tue, 20 Jun 2023 17:26:14 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/cognito_user_self_signup/ Unauthenticated Enumeration of Azure Active Directory Email Addresses Discover how to exploit information disclosure configurations in Azure Active Directory to enumerate valid email addresses. https://hackingthe.cloud/azure/enum_email_addresses/ Tue, 11 Apr 2023 13:31:32 +0000 Hacking The Cloudhttps://hackingthe.cloud/azure/enum_email_addresses/ Unauthenticated Enumeration of Google Workspace Email Addresses Discover how to exploit information disclosure configurations in Google Workspace to enumerate valid email addresses. https://hackingthe.cloud/gcp/enumeration/enum_email_addresses/ Tue, 11 Apr 2023 13:31:32 +0000 Hacking The Cloudhttps://hackingthe.cloud/gcp/enumeration/enum_email_addresses/ Create a Console Session from IAM Credentials How to use IAM credentials to create an AWS Console session. https://hackingthe.cloud/aws/post_exploitation/create_a_console_session_from_iam_credentials/ Mon, 20 Feb 2023 16:48:45 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/post_exploitation/create_a_console_session_from_iam_credentials/ S3 Streaming Copy Utilizng standard out to standard in with aws-cli utilizing multiple profiles to avoid logging and detection in a victim environment https://hackingthe.cloud/aws/exploitation/s3_streaming_copy/ Fri, 10 Feb 2023 15:12:48 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/s3_streaming_copy/ Exfiltrating S3 Data with Bucket Replication Policies Backdooring S3 buckets with Bucket Replication Policies. https://hackingthe.cloud/aws/exploitation/s3-bucket-replication-exfiltration/ Thu, 26 Jan 2023 01:02:06 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/s3-bucket-replication-exfiltration/ 2022 Wrap-up An end of year summary for Hacking the Cloud in 2022. https://hackingthe.cloud/blog/2022_wrap-up/ Wed, 14 Dec 2022 03:27:50 +0000 Hacking The Cloudhttps://hackingthe.cloud/blog/2022_wrap-up/ Loot Public EBS Snapshots How to find and take advantage of exposed EBS snapshots. https://hackingthe.cloud/aws/enumeration/loot_public_ebs_snapshots/ Mon, 05 Dec 2022 02:08:42 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/enumeration/loot_public_ebs_snapshots/ Misconfigured Resource-Based Policies Common misconfigurations of resource-based policies and how they can be abused. https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/ Thu, 24 Nov 2022 22:14:38 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/ Abusing Misconfigured ECR Resource Policies How to take advantage of misconfigured AWS ECR private repositories. https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/misconfigured_ecr_resource_policy/ Thu, 24 Nov 2022 22:14:38 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/misconfigured_ecr_resource_policy/ AWS Organizations Defaults & Pivoting How to abuse AWS Organizations' default behavior and lateral movement capabilities. https://hackingthe.cloud/aws/general-knowledge/aws_organizations_defaults/ Sat, 05 Nov 2022 00:02:54 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/general-knowledge/aws_organizations_defaults/ Abusing Elastic Container Registry for Lateral Movement With ECR permissions you can easily distribute a backdoor to production servers, developer's laptops, or CI/CD pipelines and own the environment by gaining privileged permissions. https://hackingthe.cloud/aws/exploitation/abusing-container-registry/ Thu, 13 Oct 2022 01:37:41 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/abusing-container-registry/ Hacking The Cloud v2: New Look All about the new look for Hacking The Cloud v2. https://hackingthe.cloud/blog/v2_new_look/ Sun, 18 Sep 2022 21:18:30 +0000 Hacking The Cloudhttps://hackingthe.cloud/blog/v2_new_look/ GCP Goat GCP Goat is the Vulnerable application for learning the GCP Security https://hackingthe.cloud/gcp/capture_the_flag/gcp-goat/ Mon, 29 Aug 2022 00:18:19 +0000 Hacking The Cloudhttps://hackingthe.cloud/gcp/capture_the_flag/gcp-goat/ Thunder CTF GCP themed CTF https://hackingthe.cloud/gcp/capture_the_flag/thunder_ctf/ Mon, 29 Aug 2022 00:18:19 +0000 Hacking The Cloudhttps://hackingthe.cloud/gcp/capture_the_flag/thunder_ctf/ Hunting GCP Buckets How to find valid and invalid GCP Buckets using tools https://hackingthe.cloud/gcp/general-knowledge/gcp-buckets/ Mon, 29 Aug 2022 00:18:19 +0000 Hacking The Cloudhttps://hackingthe.cloud/gcp/general-knowledge/gcp-buckets/ Privilege Escalation in Google Cloud Platform Privilege escalation techniques for Google Cloud Platform (GCP) https://hackingthe.cloud/gcp/exploitation/gcp_iam_privilege_escalation/ Wed, 24 Aug 2022 12:25:09 +0000 Hacking The Cloudhttps://hackingthe.cloud/gcp/exploitation/gcp_iam_privilege_escalation/ Enumerate Service Account Permissions Brute force the permissions of a service account to see what you have access to. https://hackingthe.cloud/gcp/enumeration/enumerate_service_account_permissions/ Tue, 23 Aug 2022 14:34:53 +0000 Hacking The Cloudhttps://hackingthe.cloud/gcp/enumeration/enumerate_service_account_permissions/ Terraform ANSI Escape Using ANSI Escape Sequences to Hide Malicious Terraform Code https://hackingthe.cloud/terraform/terraform_ansi_escape_evasion/ Sat, 09 Jul 2022 00:02:47 +0000 Hacking The Cloudhttps://hackingthe.cloud/terraform/terraform_ansi_escape_evasion/ Default Account Information Default information on how accounts and service accounts exist in GCP https://hackingthe.cloud/gcp/general-knowledge/default-account-names/ Sun, 29 May 2022 13:26:35 +0000 Hacking The Cloudhttps://hackingthe.cloud/gcp/general-knowledge/default-account-names/ Security and Constraints Security considerations and constraints that are unique to GCP https://hackingthe.cloud/gcp/general-knowledge/security-and-constraints/ Sun, 29 May 2022 13:26:35 +0000 Hacking The Cloudhttps://hackingthe.cloud/gcp/general-knowledge/security-and-constraints/ Using Stolen IAM Credentials How to work with stolen IAM credentials and things to consider. https://hackingthe.cloud/aws/general-knowledge/using_stolen_iam_credentials/ Sat, 14 May 2022 21:51:44 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/general-knowledge/using_stolen_iam_credentials/ Run Shell Commands on EC2 with Send Command or Session Manager Leverage privileged access in an AWS account to run arbitrary commands on an EC2 instance. https://hackingthe.cloud/aws/post_exploitation/run_shell_commands_on_ec2/ Mon, 11 Apr 2022 23:11:43 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/post_exploitation/run_shell_commands_on_ec2/ Abusing Managed Identities Abusing Managed Identities https://hackingthe.cloud/azure/abusing-managed-identities/ Sun, 27 Mar 2022 16:57:50 +0000 Hacking The Cloudhttps://hackingthe.cloud/azure/abusing-managed-identities/ Anonymous Blob Access Finding and accessing files stored in Azure Storage Accounts without authentication. https://hackingthe.cloud/azure/anonymous-blob-access/ Sat, 19 Mar 2022 16:57:37 +0000 Hacking The Cloudhttps://hackingthe.cloud/azure/anonymous-blob-access/ Soft Deleted Blobs Recovering and accessing files in private Storage Accounts that have been deleted. https://hackingthe.cloud/azure/soft-deleted-blobs/ Thu, 17 Mar 2022 14:35:54 +0000 Hacking The Cloudhttps://hackingthe.cloud/azure/soft-deleted-blobs/ AWS API Call Hijacking via ACM-PCA By modifying the route53 entries and utilizing the acm-pca private CA one can hijack the calls to AWS API inside the AWS VPC https://hackingthe.cloud/aws/exploitation/route53_modification_privilege_escalation/ Sun, 13 Mar 2022 23:45:47 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/route53_modification_privilege_escalation/ CI/CDon't An AWS/GitLab CICD themed CTF. https://hackingthe.cloud/aws/capture_the_flag/cicdont/ Sat, 05 Mar 2022 04:00:57 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/capture_the_flag/cicdont/ Enumerate AWS Account ID from an EC2 Instance With access to an ec2 instance, you will be able to identify the AWS account it runs in. https://hackingthe.cloud/aws/enumeration/account_id_from_ec2/ Sun, 27 Feb 2022 22:50:13 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/enumeration/account_id_from_ec2/ [Deprecated] Whoami - Get Principal Name From Keys During an assessment you may find AWS IAM credentials. Use these tactics to identify the principal of the keys. https://hackingthe.cloud/aws/deprecated/whoami/ Wed, 09 Feb 2022 04:00:32 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/deprecated/whoami/ Modify GuardDuty Configuration Modify existing GuardDuty configurations in the target account to hinder alerting and remediation capabilities. https://hackingthe.cloud/aws/avoiding-detection/modify-guardduty-config/ Sun, 30 Jan 2022 10:32:26 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/avoiding-detection/modify-guardduty-config/ Terraform Enterprise: Attack the Metadata Service Leverage a default configuration in Terraform Enterprise to steal credentials from the Metadata Service https://hackingthe.cloud/terraform/terraform_enterprise_metadata_service/ Thu, 23 Dec 2021 21:59:38 +0000 Hacking The Cloudhttps://hackingthe.cloud/terraform/terraform_enterprise_metadata_service/ Hacking The Cloud The encyclopedia for offensive security in the cloud https://hackingthe.cloud/ Tue, 30 Nov 2021 05:00:09 +0000 Hacking The Cloudhttps://hackingthe.cloud/ AWS IAM Privilege Escalation Techniques Common techniques that can be leveraged to escalate privileges in an AWS account. https://hackingthe.cloud/aws/exploitation/iam_privilege_escalation/ Thu, 04 Nov 2021 21:03:24 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/iam_privilege_escalation/ Metadata in Google Cloud Instances Information about the data an attacker can access via GCP's API endpoints https://hackingthe.cloud/gcp/general-knowledge/metadata_in_google_cloud_instances/ Sun, 24 Oct 2021 17:41:56 +0000 Hacking The Cloudhttps://hackingthe.cloud/gcp/general-knowledge/metadata_in_google_cloud_instances/ Lambda Persistence How to establish persistence on a Lambda function after getting remote code execution. https://hackingthe.cloud/aws/post_exploitation/lambda_persistence/ Thu, 16 Sep 2021 15:02:21 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/post_exploitation/lambda_persistence/ Get IAM Credentials from a Console Session Convert access to the AWS Console into IAM credentials. https://hackingthe.cloud/aws/post_exploitation/get_iam_creds_from_console_session/ Wed, 14 Jul 2021 20:46:17 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/post_exploitation/get_iam_creds_from_console_session/ [Deprecated] Enumerate Permissions without Logging to CloudTrail Leverage a bug in the AWS API to enumerate permissions for a role without logging to CloudTrail and alerting the Blue Team. https://hackingthe.cloud/aws/deprecated/stealth_perm_enum/ Tue, 18 May 2021 19:13:08 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/deprecated/stealth_perm_enum/ S3 File ACL Persistence Maintain access to S3 resources by configuring Access Control Lists associated with S3 Buckets or Objects. https://hackingthe.cloud/aws/post_exploitation/s3_acl_persistence/ Tue, 13 Apr 2021 02:53:30 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/post_exploitation/s3_acl_persistence/ Enumerate AWS Account ID from a Public S3 Bucket Knowing only the name of a public S3 bucket, you can ascertain the account ID it resides in. https://hackingthe.cloud/aws/enumeration/account_id_from_s3_bucket/ Sat, 03 Apr 2021 01:39:08 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/enumeration/account_id_from_s3_bucket/ Bypass GuardDuty Tor Client Findings Connect to the Tor network from an EC2 instance without alerting GuardDuty. https://hackingthe.cloud/aws/avoiding-detection/guardduty-tor-client/ Sat, 20 Feb 2021 04:07:08 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/avoiding-detection/guardduty-tor-client/ Intercept SSM Communications With access to an EC2 instance you can intercept, modify, and spoof SSM communications. https://hackingthe.cloud/aws/post_exploitation/intercept_ssm_communications/ Sat, 06 Feb 2021 17:17:59 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/post_exploitation/intercept_ssm_communications/ Role Chain Juggling Keep your access by chaining assume-role calls. https://hackingthe.cloud/aws/post_exploitation/role-chain-juggling/ Wed, 03 Feb 2021 03:20:50 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/post_exploitation/role-chain-juggling/ User Data Script Persistence Maintain access to an EC2 instance and it's IAM role via user data scripts. https://hackingthe.cloud/aws/post_exploitation/user_data_script_persistence/ Wed, 03 Feb 2021 03:20:50 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/post_exploitation/user_data_script_persistence/ Introduction to the Instance Metadata Service An introduction to the Instance Metadata Service and how to access it. https://hackingthe.cloud/aws/general-knowledge/intro_metadata_service/ Sun, 20 Dec 2020 20:10:43 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/general-knowledge/intro_metadata_service/ Introduction to User Data An introduction to EC2 User Data and how to access it. https://hackingthe.cloud/aws/general-knowledge/introduction_user_data/ Sun, 20 Dec 2020 20:10:43 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/general-knowledge/introduction_user_data/ Brute Force IAM Permissions Brute force the IAM permissions of a user or role to see what you have access to. https://hackingthe.cloud/aws/enumeration/brute_force_iam_permissions/ Sun, 20 Dec 2020 18:58:26 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/enumeration/brute_force_iam_permissions/ Get Account ID from AWS Access Keys Techniques to enumerate the account ID associated with an AWS access key. https://hackingthe.cloud/aws/enumeration/get-account-id-from-keys/ Sun, 27 Sep 2020 16:06:37 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/enumeration/get-account-id-from-keys/ Whoami - Get Principal Name From Keys During an assessment you may find AWS IAM credentials. Use these tactics to identify the principal of the keys. https://hackingthe.cloud/aws/enumeration/whoami/ Fri, 21 Aug 2020 17:00:02 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/enumeration/whoami/ Steal IAM Credentials and Event Data from Lambda Leverage file read and SSRF vulnerabilities to steam IAM credentials and event data from Lambda. https://hackingthe.cloud/aws/exploitation/lambda-steal-iam-credentials/ Wed, 12 Aug 2020 23:15:50 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/lambda-steal-iam-credentials/ Unauthenticated Enumeration of IAM Users and Roles Discover how to exploit cross-account behaviors to enumerate IAM users and roles in another AWS account without authentication. https://hackingthe.cloud/aws/enumeration/enum_iam_user_role/ Wed, 05 Aug 2020 14:32:32 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/enumeration/enum_iam_user_role/ Steal EC2 Metadata Credentials via SSRF Old faithful; How to steal IAM Role credentials from the EC2 Metadata service via SSRF. https://hackingthe.cloud/aws/exploitation/ec2-metadata-ssrf/ Sat, 01 Aug 2020 17:43:14 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/exploitation/ec2-metadata-ssrf/ Connection Tracking Abuse security group connection tracking to maintain persistence even when security group rules are changed. https://hackingthe.cloud/aws/general-knowledge/connection-tracking/ Thu, 30 Jul 2020 23:28:52 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/general-knowledge/connection-tracking/ IAM unique identifiers Chart of the IAM unique ID prefixes. https://hackingthe.cloud/aws/general-knowledge/iam-key-identifiers/ Mon, 27 Jul 2020 19:47:46 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/general-knowledge/iam-key-identifiers/ Bypass GuardDuty Pentest Findings for the AWS CLI Prevent Kali Linux, ParrotOS, and Pentoo Linux from throwing GuardDuty alerts by modifying the User Agent string when using the AWS CLI. https://hackingthe.cloud/aws/avoiding-detection/guardduty-pentest/ Wed, 22 Jul 2020 02:58:24 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/avoiding-detection/guardduty-pentest/ Bypass Credential Exfiltration Detection When stealing IAM credentials from an EC2 instance you can avoid a GuardDuty detection by using VPC Endpoints. https://hackingthe.cloud/aws/avoiding-detection/steal-keys-undetected/ Wed, 22 Jul 2020 02:58:24 +0000 Hacking The Cloudhttps://hackingthe.cloud/aws/avoiding-detection/steal-keys-undetected/