Resource Exploitation

Resource Exploitation

Theory

  • Deployed resources (EC2, Lambda functions, Webapps, etc.) are at risk of having vulnerabilities

    • Unpatched software with known vulns

    • Weak authentication

    • SQL or command injection vulns

    • Server-side Request Forgery (SSRF)

  • Exploitation of resources can lead to remote access but also roles in AWS

Last updated