Resource Exploitation
Theory
Deployed resources (EC2, Lambda functions, Webapps, etc.) are at risk of having vulnerabilities
Unpatched software with known vulns
Weak authentication
SQL or command injection vulns
Server-side Request Forgery (SSRF)
Exploitation of resources can lead to remote access but also roles in AWS
Last updated
Was this helpful?