AWS Penetration Testing Part 2 – S3, IAM, EC2

AWS Penetration Testing Part 2 – S3, IAM, EC2

Penetration Testing AWS Services AWS Penetration Testing Part 2. S3, IAM, EC2 S3 and IAM Policies Unlike ACLs and bucket policies, IAM policies are targeted at IAM users/groups instead of S3 buckets and objects. Using an IAM policy, we can give an IAM user limited access to S3 resources (or ... Read More
AWS Penetration Testing Part 1 – S3 Buckets

AWS Penetration Testing Part 1 – S3 Buckets

Penetration Testing AWS Services AWS Penetration Testing Part 1. S3 Buckets Amazon Web Services (AWS) provides some of the most powerful and robust infrastructure for modern web applications. As with all new functionality on the web, new security considerations inevitably arise. For penetration testers, a number of AWS services can ... Read More
Arrow

Understanding jQuery Security

| | Penetration Testing, security
Application Penetration Testing The jQuery Security Model Explained jQuery is a JavaScript UI framework which provides an abstraction layer to many DOM manipulation functions. It provides developers with a friendly interface to quickly and dynamically update DOM without reloading the entire page. It’s a surprisingly simple concept but has given ... Read More