IAM-Flaws: Exploiting User and Group Policies in AWS IAM
Introduction Hi everyone, back with another blog. A few days back I had written about how we could exploit misconfigurations in an AWS S3 Bucket and had also built a tool that could easily automate the whole process after...