Category: Ethical Hacking
Ethical Hacking Courses
How hackers use this AWS ransomware attack
AWS IAM Privilege Escalation Learning Path
So you want to learn about AWS IAM privilege escalations…where should you start, and what should you learn? We launched a course specifically for this…
AWS Secrets Manager Enumeration – Cybr Lab Walkthrough
In this lab walkthrough, we’re going to take a look at how to enumerate the AWS Secrets Manager service in order to better understand how…
Introducing Free AWS Cloud Security Hands-On Labs
Our free Hands-On Labs are a great way to dip your toes into the AWS cloud security space completely risk-free. No credit card required, just…
Request forgeries (CSRF, XSRF, SSRF)
In 2020, CheckPoint Research announced multiple vulnerabilities in the popular social media application named TikTok. One of the found vulnerabilities allowed an attacker to delete…
Intro to AWS Pentesting (with Pacu)
In this article, you’re going to learn how to hack AWS cloud environments so that you can find exploitable vulnerabilities in your own AWS accounts…
Exercise types (red/blue/white/purple teams)
We’ve talked about how we can use vulnerability scans, penetration tests, and bug bounties to find vulnerabilities in our systems. Another approach you may have…
What are SQL Injections? // Explained in 180 seconds
Whenever you visit a website or use some kind of application, that website or app needs to pull data from a database. For example, let’s…
Important pentesting concepts for the Security+
You’ve been running vulnerability scans on a regular basis, you’ve expanded that into a broader vulnerability assessment approach, and you’ve been fixing everything that’s been…