Published inR3d Buck3TADCS Attack Series: Abusing ESC4 via Template ACLs for Privilege EscalationExploiting ACL misconfigurations on ADCS templates to escalate privileges across the domain2d ago2d ago
Published inR3d Buck3TADCS Attack Series: Abusing ESC9 for Privilege Escalation via Weak Certificate MappingLearn how missing objectSid values and permissive ACLs enable user impersonation through ADCS certificate mapping.Jun 6Jun 6
Published inR3d Buck3TGCP Privilege Escalation: Abusing Function Admin Role for Full Project TakeoverLearn how attackers can escalate privileges in Google Cloud by exploiting misconfigured function role to gain Owner-level accessMay 4May 4
Published inInfoSec Write-upsStealing Accesses tokens from Cloud Functions in GCPHow Attackers Leverage Serverless Functions to Escalate Privileges and Move LaterallyFeb 8Feb 8
Published inR3d Buck3TAbusing Compute Instance IAM Misconfigurations to Gain Privileges in GCPExploiting misconfigured IAM roles on GCP Compute Instances to obtain additional access and escalate privilegesFeb 7Feb 7
Published inR3d Buck3TStealing Cloud Function Access Tokens with Misconfigured IAM Policy [GCP]How Misconfigured IAM Policies in Google Cloud Can Lead to Cloud Function Access Token Exposure and ExploitationFeb 3Feb 3
Published inR3d Buck3TPayload Delivery with Azure Static Website and IPFS DropperWeaponizing InterPlanetary File System and Azure SitesMay 22, 2024May 22, 2024
Published inR3d Buck3TConfigure Fireprox for IP Rotation using AWS API GatewayUnlock the power of the AWS API gateway with Fireprox configurationMay 13, 2024May 13, 2024
Published inInfoSec Write-upsRed Teaming with Azure: Building C2 Infrastructure with Azure VMsA Step-by-Step Guide to Deploying C2 VMsMay 10, 2024May 10, 2024
Published inR3d Buck3TAdding Certificates to Postman & Burp Suite for API TestingTesting APIs with Certificate-based authenticationApr 30, 2024Apr 30, 2024