How to Exfiltrate AWS EC2 Data

As Cloud infrastructure has become common, it has also become common for penetration testers to find themselves attacking clients that rely on e.g. AWS or Azure environments for handling, storing, and processing critical data. There are many new and interesting attack paths an adversary can take once they have obtained some sort of access to […]

The post How to Exfiltrate AWS EC2 Data appeared first on Nettitude Labs.

Article Link: