Exploiting Misconfigurations in Azure AWS, and GCP | Cyber Codex

The Cloud as a Primary Attack Surface
Reconnaissance and Enumeration
Azure:
Credentialed Access (via Az CLI):
MicroBurst (PowerShell)
Google Cloud Platform (GCP):
Enumeration with gcloud CLI:
CloudFox Sample Command:

AWS (Amazon Web Services)
High Impact Misconfigurations in GCP, AWS, and Azure
Azure Misconfigurations
Misconfigurations, Attack Vector & Impact:
GCP Misconfigurations
Misconfigurations, Attack Vector & Impact:
AWS Misconfigurations
Misconfigurations, Attack Vector & Impact:
Privilege Escalation and Lateral Movement
Azure Escalation Chain Example:
GCP Escalation Chain Example:
AWS Escalation Chain Example:
Hands-On Labs and Simulations
Azure Labs
GCP Labs
AWS Labs
Blue Team Countermeasures
Final Thoughts
PreviousBreaking Root: The Ultimate Linux Priv Esc Handbook | Cyber CodexNextInside the Mind of a Red Teamer: A Realistic Attack Simulation | Cyber Codex
Last updated
Was this helpful?
