cloud
2024
Threats and Countermeasures in AWS Environments from an Attacker’s PerspectiveAugust 25, 2024⭐︎ Introduction to Cloud Security - Threats and Countermeasures when Focusing on the AWS Environment from an Offensive PerspectiveJuly 10, 2024Story about being selected as an AWS Community BuilderMarch 11, 2024⭐︎ Introduction to Cloud Security from an Offensive Perspective (AWS Edition)January 22, 2024Summary of CTF Cloud attack methods (2023 version)January 9, 20242023
Avoiding MFA authentication for AWS login by phishing and case studiesSeptember 4, 2023Security-JAWS DAYS Participation Record & CTF Creator CommentaryAugust 31, 2023⭐︎ Security (vulnerability) cases in Amazon EC2August 31, 2023⭐︎ Summary of CTF Cloud attack methods (2022 version)May 22, 20232022
Summary of HTB Cloud attack methodsOctober 13, 2022⭐︎ Summary of CTF Cloud attack methods (2021 version)October 11, 2022Security risks of serverless environments in AWS servicesOctober 8, 2022⭐︎ Security risks and countermeasures due to vulnerable use of Amazon S3July 26, 2022⭐︎ Security risks and countermeasures in AWS LambdaMay 30, 2022⭐︎ Serverless Security Risks - Vulnerability Attacks and Countermeasures in AWS LambdaMarch 16, 2022AWS Lambda Pitfalls - Risks and Security Measures Due to Vulnerable LibrariesFebruary 24, 2022