Published inInfoSec Write-upsStealing Accesses tokens from Cloud Functions in GCPHow Attackers Leverage Serverless Functions to Escalate Privileges and Move LaterallyFeb 8Feb 8
Published inR3d Buck3TAbusing Compute Instance IAM Misconfigurations to Gain Privileges in GCPExploiting misconfigured IAM roles on GCP Compute Instances to obtain additional access and escalate privilegesFeb 7Feb 7
Published inR3d Buck3TStealing Cloud Function Access Tokens with Misconfigured IAM Policy [GCP]How Misconfigured IAM Policies in Google Cloud Can Lead to Cloud Function Access Token Exposure and ExploitationFeb 3Feb 3
Published inR3d Buck3TPayload Delivery with Azure Static Website and IPFS DropperWeaponizing InterPlanetary File System and Azure SitesMay 22, 2024May 22, 2024
Published inR3d Buck3TConfigure Fireprox for IP Rotation using AWS API GatewayUnlock the power of the AWS API gateway with Fireprox configurationMay 13, 2024May 13, 2024
Published inInfoSec Write-upsRed Teaming with Azure: Building C2 Infrastructure with Azure VMsA Step-by-Step Guide to Deploying C2 VMsMay 10, 2024May 10, 2024
Published inR3d Buck3TAdding Certificates to Postman & Burp Suite for API TestingTesting APIs with Certificate-based authenticationApr 30, 2024Apr 30, 2024
Published inInfoSec Write-upsExploiting Misconfigurations in Windows Service PermissionsA Closer Look at Common Misconfigurations in Windows Service Permissions for Privilege EscalationJan 16, 2024Jan 16, 2024
Published inR3d Buck3TRed Teaming in Cloud: Leverage Azure FrontDoor CDN for C2 RedirectorsEvading Detection: Obfuscating C2 Infrastructure with Azure FrontDoorJan 11, 2024Jan 11, 2024
Published inR3d Buck3TAbusing Dynamic Groups in AzureAD [Part 1]Leveraging Dynamic Groups for Elevated PrivilegesJan 4, 2024Jan 4, 2024