Black Hills InfoSec - AWS: Assuming Access Key Compromise
Jordan Drysdale//* In this blog, we are assuming that we have obtained an access key, a secret key and maybe a .pem key from a network user who left these things lying around. What services do they have access to? How far can we get? Here we stand again, on the shoulders of giants with […]
The post AWS: Assuming Access Key Compromise appeared first on Black Hills Information Security.
from Black Hills Information Security https://www.blackhillsinfosec.com/aws-assuming-access-key-compromise/