Understanding GCP service accounts is crucial for managing programmatic access and minimizing risks. Our latest blog explains the default naming conventions, such as [email protected], and application-based accounts like [email protected]. We also guide you on using these accounts securely within your cloud projects. Enhance your GCP security skills by diving into these practical insights. Read more:
Hacking the Cloud
Computer and Network Security
The open-source encyclopedia of offensive security techniques in the cloud.
About us
Hacking the Cloud is an open-source encyclopedia of offensive security techniques that can be used in cloud environments.
- Website
-
https://hackingthe.cloud
External link for Hacking the Cloud
- Industry
- Computer and Network Security
- Company size
- 1 employee
- Type
- Nonprofit
- Specialties
- Cloud Security, AWS, Azure, GCP, and Hacking
Updates
-
The instance metadata service (IMDS) on EC2 provides vital information yet poses security risks if compromised. Learn how IMDSv2 introduces robust measures, such as token authentication and configuration tweaks, to mitigate potential threats. Ideal for enhancing cloud infrastructure security. Full insights:
Introduction to the Instance Metadata Service - Hacking The Cloud
hackingthe.cloud
-
Master the conversion of AWS unique identifiers into principal ARNs. Our new post demystifies the process using IAM unique IDs in resource-based policies. An invaluable resource for professionals dealing with AWS configurations. Find out more at
Derive a Principal ARN from an AWS Unique Identifier - Hacking The Cloud
hackingthe.cloud
-
Unravel effective AWS IAM privilege escalation techniques in our latest analysis. Learn how adversaries can leverage permissions like IAM PassRole and lambda:CreateFunction to access elevated privileges by exploiting common AWS misconfigurations. An essential read for cloud security professionals. Explore the full article:
AWS IAM Privilege Escalation Techniques - Hacking The Cloud
-
Maintaining access to critical AWS resources discreetly can be crucial. Discover how S3 ACLs offer a robust method to ensure extended access without relying on traditional IAM user and role configurations. Perfect for those looking to optimize security strategies. Full details here:
S3 File ACL Persistence - Hacking The Cloud
hackingthe.cloud
-
Dive into the world of AWS IAM persistence techniques! From access keys to login profiles and IAM roles, learn how attackers maintain access and the importance of auditing these areas to prevent breaches. For a comprehensive guide to enhancing your cloud security, check out our full article: https://lnkd.in/eDHHjDwu
AWS IAM Persistence Methods - Hacking The Cloud
hackingthe.cloud
-
Understanding AWS IAM persistence is crucial for maintaining robust security protocols. This article discusses various methods attackers use to sustain access within AWS, including the creation of access keys and manipulation of role policies. Learn preventative measures to secure your cloud environment effectively. Read more here:
AWS IAM Persistence Methods - Hacking The Cloud
hackingthe.cloud
-
Hacking the Cloud reposted this
If you're going to fwd:cloudsec, be on the lookout for exclusive stickers! Cat not included.
-
Navigating AWS with just CLI can be cumbersome. Discover how aws-vault leverages your IAM credentials to facilitate AWS Console access. Suitable for both long-term and temporary keys, this method supports secure, efficient cloud operations, simplifying the user experience. Explore the technique:
Create a Console Session from IAM Credentials - Hacking The Cloud
hackingthe.cloud
-
Professionals in cloud security can enhance their stealth assessment tactics by utilizing error messages from AWS API calls, like sqs:ListQueues, to identify IAM principal names without triggering CloudTrail logs. This approach is invaluable for discreet operations. Full details at
Whoami - Get Principal Name From Keys - Hacking The Cloud