Skip to content

Security Café

Security Research and Services

  • Things we do on a daily basis
    • Red Team (DORA/TIBER) exercises
    • Web Application Penetration Testing
    • Mobile Application Penetration Testing
    • Infrastructure Penetration Testing
    • Vulnerability Assessment
  • CVEs, Talks and Tools
  • Contact
  • About

Tag: cloud

Azure CloudQuarry: Searching for secrets in Public VM Images

November 19, 2024 Stefan Tita

After the initial investigation entitled “AWS CloudQuarry: Digging for secrets in Public AMIs” was finalized, we continued with the same idea on Azure in order

Continue reading

AWS CloudQuarry: Digging for Secrets in Public AMIs

May 8, 2024 Eduard Agavriloae

Money, secrets and mass exploitation: This research unveils a quarry of sensitive data stored in public AMIs. Digging through each AMI we managed to collect

Continue reading

7 lesser-known AWS SSM Document techniques for code execution

April 19, 2023 Eduard Agavriloae

A deep dive into AWS SSM Run Command shows that there are multiple documents attackers can use for executing code remotely on EC2 instances. In

Continue reading

AWS ssm:SendCommand or network agnostic built-in RCE as root

January 17, 2023 Eduard Agavriloae

Post-exploitation in cloud can be fun and easy if you have the right permissions. There is no other permission that I would rather have than

Continue reading

Certified Hybrid Multi-Cloud Red Team Specialist – Review and Tips

August 1, 2022 Eduard Agavriloae

You might not be familiar with this one, but it is a certification offered by Cyberwarfare Labs that is focusing on exploiting infrastructures that combine

Continue reading

Top Posts

  • Mobile Pentesting 101: How to Install Split APKs
  • AWS CloudQuarry: Digging for Secrets in Public AMIs
  • AWS ssm:SendCommand or network agnostic built-in RCE as root
  • A Complete Kubernetes Config Review Methodology
  • Introduction to Windows shellcode development - Part 1

Blog Stats

  • 553,108 hits

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 156 other subscribers

Categories

  • Active Directory (4)
  • Announcements (2)
  • C2 (1)
  • Cloud Security (12)
    • aws (9)
    • Azure (3)
    • Kubernetes (1)
  • Conferences (4)
  • Embedded systems security (3)
    • IoT Pentesting (2)
  • Ethical Hacking (18)
  • General security (13)
  • IT Security Assurance (1)
  • IT Security Audit (2)
  • Metasploit (1)
  • Misc (20)
    • Artificial Intelligence (1)
    • Code Review (1)
    • CVE (1)
  • Mobile security (12)
  • Network security (7)
  • Operating systems (2)
  • Penetration Testing (24)
  • Pentest techniques (31)
  • Research (3)
  • Web security (13)
  • Wireless security (1)
Blog at WordPress.com.
  • Subscribe Subscribed
    • Security Café
    • Join 156 other subscribers
    • Already have a WordPress.com account? Log in now.
    • Security Café
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar