Cybr - Pentesting AWS Environments with Pacu CloudGoat and ChatGPT hide01.ir


File Information

File Size:   1.31 GB
Creat Time:   2025-10-01
Active Degree:   1
Last Active:   2025-10-01
Magnet Link:    Magnet LinkMagnet Link
Download and install the app:   Click to download and install
Statement:   This site does not provide download links, only text displays, and does not contain any infringement.

File List

  1. 5. Vulnerable Lambda (Small or Easy)/3. [DEMO] Exploiting vulnerable Lambda functions for admin access hide01.ir.mp4 164.45 MB
  2. 1. Introduction/2. About using CloudGoat, Pacu, and ChatGPT hide01.ir.mp4 138.98 MB
  3. 2. Setting up our lab environment/3. [DEMO] Pacu [Option #2] Use with Docker hide01.ir.mp4 107.04 MB
  4. 9. ECS Takeover (Medium or Moderate)/3. [DEMO] ECS Takeover hide01.ir.mp4 102.79 MB
  5. 1. Introduction/1. About the course and author hide01.ir.mp4 99.36 MB
  6. 7. Cloud Breach via S3 (Small or Moderate)/2. [LAB] [DEMO] Exploiting EC2 to reach S3 hide01.ir.mp4 93.36 MB
  7. 2. Setting up our lab environment/6. [DEMO] Configuring AWS access credentials for CloudGoat hide01.ir.mp4 86.88 MB
  8. 6. IAM Privilege Escalation by Rollback (Small or Easy)/2. [DEMO] Exploiting IAM versions hide01.ir.mp4 66.83 MB
  9. 9. ECS Takeover (Medium or Moderate)/2. [DEMO] ECS RCE exploit to get credentials hide01.ir.mp4 53.44 MB
  10. 2. Setting up our lab environment/5. [DEMO] CloudGoat [Option #2] Running with Docker hide01.ir.mp4 46.19 MB
  11. 3. Getting started with Pacu/Pacu Quick Start Guide hide01.ir.mp4 44.97 MB
  12. 2. Setting up our lab environment/2. [DEMO] Pacu [Option #1] Install with pip [Recommended] hide01.ir.mp4 43.04 MB
  13. 4. IAM Privilege Escalation by Misconfiguration (Small or Easy)/1. Scenario overview hide01.ir.mp4 39.52 MB
  14. 7. Cloud Breach via S3 (Small or Moderate)/3. Preventing this exploit hide01.ir.mp4 36.47 MB
  15. 9. ECS Takeover (Medium or Moderate)/4. [DEMO] Cleaning up our lab environment hide01.ir.mp4 33.12 MB
  16. 5. Vulnerable Lambda (Small or Easy)/2. [DEMO] Creating our lab environment hide01.ir.mp4 27.03 MB
  17. 4. IAM Privilege Escalation by Misconfiguration (Small or Easy)/2. [DEMO] Admin privilege escalation demonstration hide01.ir.mp4 25.44 MB
  18. 2. Setting up our lab environment/4. [DEMO] CloudGoat [Option #1] Install with Git hide01.ir.mp4 24.87 MB
  19. 2. Setting up our lab environment/7. [DEMO] Configuring AWS access credentials hide01.ir.mp4 24.72 MB
  20. 9. ECS Takeover (Medium or Moderate)/1. Scenario walkthrough hide01.ir.mp4 24.20 MB
  21. 6. IAM Privilege Escalation by Rollback (Small or Easy)/3. [DEMO] Cleaning up our lab environment hide01.ir.mp4 15.44 MB
  22. 5. Vulnerable Lambda (Small or Easy)/4. [DEMO] Cleaning up our lab environment hide01.ir.mp4 14.31 MB
  23. 4. IAM Privilege Escalation by Misconfiguration (Small or Easy)/3. [DEMO] Cleaning up our lab environment hide01.ir.mp4 7.95 MB
  24. 7. Cloud Breach via S3 (Small or Moderate)/1. Scenario walkthrough hide01.ir.mp4 7.60 MB
  25. 5. Vulnerable Lambda (Small or Easy)/1. Scenario overview hide01.ir.mp4 5.36 MB
  26. 6. IAM Privilege Escalation by Rollback (Small or Easy)/1. Scenario overview hide01.ir.mp4 4.22 MB
  27. 8. IMDSv2 Compromise (SMALL or MODERATE)/2. [LAB] Compromise EC2 IMDSv2 with RCE.pdf 1.64 MB
  28. 9. ECS Takeover (Medium or Moderate)/3. [DEMO] ECS Takeover.pdf 527 KB
  29. 5. Vulnerable Lambda (Small or Easy)/3. [DEMO] Exploiting vulnerable Lambda functions for admin access.pdf 426 KB
  30. 1. Introduction/5. [LAB] Create a billing alert to avoid surprise bills.pdf 375 KB
  31. 4. IAM Privilege Escalation by Misconfiguration (Small or Easy)/2. [DEMO] Admin privilege escalation demonstration.pdf 281 KB
  32. 9. ECS Takeover (Medium or Moderate)/2. [DEMO] ECS RCE exploit to get credentials.pdf 261 KB
  33. 7. Cloud Breach via S3 (Small or Moderate)/2. [LAB] [DEMO] Exploiting EC2 to reach S3.pdf 223 KB
  34. 6. IAM Privilege Escalation by Rollback (Small or Easy)/2. [DEMO] Exploiting IAM versions.pdf 148 KB
  35. 5. Vulnerable Lambda (Small or Easy)/2. [DEMO] Creating our lab environment.pdf 148 KB
  36. 2. Setting up our lab environment/6. [DEMO] Configuring AWS access credentials for CloudGoat.pdf 144 KB
  37. 3. Getting started with Pacu/Pacu Quick Start Guide.pdf 111 KB
  38. 9. ECS Takeover (Medium or Moderate)/5. [Cheat Sheet] Solution steps (CLI).pdf 106 KB
  39. 5. Vulnerable Lambda (Small or Easy)/1. Scenario overview.pdf 105 KB
  40. 2. Setting up our lab environment/2. [DEMO] Pacu [Option #1] Install with pip [Recommended].pdf 101 KB
  41. 2. Setting up our lab environment/3. [DEMO] Pacu [Option #2] Use with Docker.pdf 101 KB
  42. 2. Setting up our lab environment/7. [DEMO] Configuring AWS access credentials.pdf 98 KB
  43. 5. Vulnerable Lambda (Small or Easy)/5. [Cheat Sheet] Solution steps (CLI).pdf 97 KB
  44. 4. IAM Privilege Escalation by Misconfiguration (Small or Easy)/1. Scenario overview.pdf 91 KB
  45. 5. Vulnerable Lambda (Small or Easy)/4. [DEMO] Cleaning up our lab environment.pdf 75 KB
  46. 6. IAM Privilege Escalation by Rollback (Small or Easy)/3. [DEMO] Cleaning up our lab environment.pdf 63 KB
  47. 2. Setting up our lab environment/4. [DEMO] CloudGoat [Option #1] Install with Git.pdf 62 KB
  48. 1. Introduction/2. About using CloudGoat, Pacu, and ChatGPT.pdf 55 KB
  49. 2. Setting up our lab environment/5. [DEMO] CloudGoat [Option #2] Running with Docker.pdf 51 KB
  50. 1. Introduction/3. Who this course is for.pdf 44 KB