How to abuse AWS Organizations' default behavior and lateral movement capabilities.| hackingthe.cloud
How to work with stolen IAM credentials and things to consider.| hackingthe.cloud
Abuse security group connection tracking to maintain persistence even when security group rules are changed.| hackingthe.cloud
Old faithful; How to steal IAM Role credentials from the EC2 Metadata service via SSRF.| hackingthe.cloud