Cloud computing refers to the delivery of computing services, including storage, processing power, and software, over the internet. Instead of owning and maintaining physical servers or hardware, users can access and use these resources on-demand from a cloud service provider.
-
What is the cloud? | Cloud definition : https://www.cloudflare.com/learning/cloud/what-is-the-cloud/
-
What is Learn to Cloud? : https://learntocloud.guide/docs/Welcome
Hacking Techniques
-
Google Cloud Platform : https://csbygb.gitbook.io/pentips/cloud-pentest/gcp
-
Introduction to Cloud Pentesting: https://www.hackthebox.com/blog/intro-cloud-pentesting
7.Hacking the cloud by Nick Frichette : https://hackingthe.cloud/
-
Cloud Security - Attacks by : https://github.com/CyberSecurityUP/Cloud-Security-Attacks
-
My AWS Pentest Methodology : https://medium.com/@MorattiSec/my-aws-pentest-methodology-14c333b7fb58
-
Permission Mining in GCP - Colin Estep : https://www.youtube.com/watch?v=QIXZ0DS9arc
Read CTF write ups: 11. flAWS writeups by Nick Doyle : https://nick-p-doyle.medium.com/flaws-cloud-a-fun-interactive-way-to-learn-the-basics-of-aws-security-19463c2b6ece
-
EC2 SSRF - Writeup https://medium.com/@vulnmachines/ec2-ssrf-vulnmachines-walkthrough-be382b83b0f6
-
Vulnerable Lambda : https://medium.com/@vulnmachines/vulnerable-lambda-vulnmachines-walkthrough-529d2fd3363c
-
Misconfigured Bucket : https://medium.com/@vulnmachines/misconfigured-bucket-vulnmachines-lab-walkthrough-509b0faa6779
-
Special Policy Bucket : https://medium.com/@vulnmachines/special-policy-bucket-vulnmachines-walkthrough-3e4927c416e9
-
Open AWS S3 bucket leaks all Images uploaded to Zomato by yashrs on Hackerone: https://hackerone.com/reports/507097
-
CVE-2019-5736: Escape from Docker and Kubernetes containers to root on host by adam_iwaniuk on Hackerone: https://hackerone.com/reports/495495
π£π₯πππ§πππ