📘
DFIR
Ctrlk
  • Networking
    • Networking
  • Windows
    • Administration
    • Forensics
    • Cheat Sheet
    • Investigation
    • Internals
    • Active Directory
    • MISC
  • Linux
    • Forensics
    • SSH
    • Linux WebShells
    • Directories of Interest
    • Internals
  • Enterprise Architecture
    • CI/CD Pipline
    • Citrix
    • Web Applications
    • The Cloud
      • AWS
        • Cases
        • Misconfigurations
        • Attacking AWS
        • Fundementals
      • Azure
      • M365
      • Cloud Labs
    • vSphere
    • Containers
    • Troubleshooting
  • Mac
    • Forensics
  • Attacker Information
    • Adversary Operations
    • Actor Playbooks
    • Abused Domains
  • IR Playbook
    • Activity from Unmanaged Host
    • Recommendations
  • Reverse Engineering
    • Python - Pyinstaller
Powered by GitBook
On this page
  1. Enterprise Architecture
  2. The Cloud
  3. AWS

Cases

LogoDetailed Analysis of CloudDon, Cloud Data Breach of Korea e-commerce companyMedium
LogoCloudGoat Official Walkthrough Series: ‘glue_privesc’Rhino Security Labs
LogoCloud Digital Forensics and Incident Response — AWS IAM Privilege Escalation Leads to EC2…Medium
LogoRansomware in the cloudwww.invictus-ir.com

LogoResponding to an attack in AWSMedium
LogoResponding to an attack in AWSMedium
LogoResponding to an attack in AWSMedium
PreviousAWSNextMisconfigurations

Last updated 7 months ago