{"version":1,"pages":[{"id":"gUy1cZczaZdV3ahk37lC","title":"whoami","pathname":"/","siteSpaceId":"sitesp_ld3Wa","description":"","breadcrumbs":[{"label":"Welcome!","emoji":"1f44b"}]},{"id":"9mMAJVKlzaN4K9V7RMVe","title":"!!! Disclaimer !!!","pathname":"/welcome/disclaimer","siteSpaceId":"sitesp_ld3Wa","description":"","breadcrumbs":[{"label":"Welcome!","emoji":"1f44b"}]},{"id":"cc0qNFkeoTYMcos3qeyx","title":"AWS Security Cookbook by Tyler","pathname":"/academy/aws-security-cookbook-by-tyler","siteSpaceId":"sitesp_ld3Wa","description":"Master AWS cloud security with this cookbook.  Dive into practical tutorials and code examples for essential services, covering common security challenges and solutions.","breadcrumbs":[{"label":"Academy","emoji":"1f393"}]},{"id":"4ySE9X5OBYW0oIiwck00","title":"AWS Control Tower","pathname":"/academy/aws-security-cookbook-by-tyler/aws-control-tower","siteSpaceId":"sitesp_ld3Wa","description":"An overview of AWS Control Tower","breadcrumbs":[{"label":"Academy","emoji":"1f393"},{"label":"AWS Security Cookbook by Tyler"}]},{"id":"lhkugP2I6g78nAaPRE1x","title":"Lab: Deploying AWS Control Tower via Terraform","pathname":"/academy/aws-security-cookbook-by-tyler/aws-control-tower/lab-deploying-aws-control-tower-via-terraform","siteSpaceId":"sitesp_ld3Wa","description":"How to deploy AWS Control Tower via Terraform","breadcrumbs":[{"label":"Academy","emoji":"1f393"},{"label":"AWS Security Cookbook by Tyler"},{"label":"AWS Control Tower"}]},{"id":"kvouPr0gkTOkn4W96G9k","title":"AWS CloudTrail","pathname":"/academy/aws-security-cookbook-by-tyler/aws-cloudtrail","siteSpaceId":"sitesp_ld3Wa","description":"How to setup and validate CloudTrail","breadcrumbs":[{"label":"Academy","emoji":"1f393"},{"label":"AWS Security Cookbook by Tyler"}]},{"id":"kFhjbkXb2ZI6Vvk5gqM1","title":"AWS GuardDuty","pathname":"/academy/aws-security-cookbook-by-tyler/aws-guardduty","siteSpaceId":"sitesp_ld3Wa","description":"An overview of AWS GuardDuty","breadcrumbs":[{"label":"Academy","emoji":"1f393"},{"label":"AWS Security Cookbook by Tyler"}]},{"id":"rjPF1JWJMQ5gjzQ9Ne6h","title":"Lab: Deploying AWS GuardDuty via Terraform","pathname":"/academy/aws-security-cookbook-by-tyler/aws-guardduty/lab-deploying-aws-guardduty-via-terraform","siteSpaceId":"sitesp_ld3Wa","description":"How to deploy AWS GuardDuty via Terraform","breadcrumbs":[{"label":"Academy","emoji":"1f393"},{"label":"AWS Security Cookbook by Tyler"},{"label":"AWS GuardDuty"}]},{"id":"gq1D9CXima4kzmfpGF9T","title":"Lab: Logging GuardDuty Findings to S3","pathname":"/academy/aws-security-cookbook-by-tyler/aws-guardduty/lab-logging-guardduty-findings-to-s3","siteSpaceId":"sitesp_ld3Wa","description":"How to export GuardDuty logs to Amazon S3","breadcrumbs":[{"label":"Academy","emoji":"1f393"},{"label":"AWS Security Cookbook by Tyler"},{"label":"AWS GuardDuty"}]},{"id":"o6dQATjjssd4NRoNsuh7","title":"Lab: Adversary Simulation Detection with Stratus Red Team and GuardDuty","pathname":"/academy/aws-security-cookbook-by-tyler/aws-guardduty/lab-adversary-simulation-detection-with-stratus-red-team-and-guardduty","siteSpaceId":"sitesp_ld3Wa","description":"Detecting Adversaries with GuardDuty","breadcrumbs":[{"label":"Academy","emoji":"1f393"},{"label":"AWS Security Cookbook by Tyler"},{"label":"AWS GuardDuty"}]},{"id":"sqVmYQuyGehQOL8hcUVf","title":"AWS IAM","pathname":"/academy/aws-security-cookbook-by-tyler/aws-iam","siteSpaceId":"sitesp_ld3Wa","description":"An overview of the AWS Identity Access Management (IAM) Service","breadcrumbs":[{"label":"Academy","emoji":"1f393"},{"label":"AWS Security Cookbook by Tyler"}]},{"id":"tXZMO1DAnSvZDZqeb1J1","title":"AWS Organizations","pathname":"/academy/aws-security-cookbook-by-tyler/aws-organizations","siteSpaceId":"sitesp_ld3Wa","description":"An overview of AWS Organizations","breadcrumbs":[{"label":"Academy","emoji":"1f393"},{"label":"AWS Security Cookbook by Tyler"}]},{"id":"m2XA2UlGeKRk22gePker","title":"Lab: Deploying AWS Organizations via Terraform","pathname":"/academy/aws-security-cookbook-by-tyler/aws-organizations/lab-deploying-aws-organizations-via-terraform","siteSpaceId":"sitesp_ld3Wa","description":"How to deploy AWS Organizations via Terraform","breadcrumbs":[{"label":"Academy","emoji":"1f393"},{"label":"AWS Security Cookbook by Tyler"},{"label":"AWS Organizations"}]},{"id":"HSLIcPv9yzLwjSJ20N84","title":"AWS Root Account Management","pathname":"/academy/aws-security-cookbook-by-tyler/aws-root-account-management","siteSpaceId":"sitesp_ld3Wa","description":"An overview of AWS Root Account Management","breadcrumbs":[{"label":"Academy","emoji":"1f393"},{"label":"AWS Security Cookbook by Tyler"}]},{"id":"xPcMwwIzB2MotblmUV3z","title":"Lab: Deploying AWS Root Account Management via Terraform","pathname":"/academy/aws-security-cookbook-by-tyler/aws-root-account-management/lab-deploying-aws-root-account-management-via-terraform","siteSpaceId":"sitesp_ld3Wa","description":"How to deploy AWS Root Account Management via Terraform","breadcrumbs":[{"label":"Academy","emoji":"1f393"},{"label":"AWS Security Cookbook by Tyler"},{"label":"AWS Root Account Management"}]},{"id":"oj1pK5LqDKiw37qaUodL","title":"AWS Service Control Policies (SCPs)","pathname":"/academy/aws-security-cookbook-by-tyler/aws-service-control-policies-scps","siteSpaceId":"sitesp_ld3Wa","description":"An overview of AWS Service Control Policies (SCPs)","breadcrumbs":[{"label":"Academy","emoji":"1f393"},{"label":"AWS Security Cookbook by Tyler"}]},{"id":"O2hx6nlqnhpA2cP9z6lz","title":"Lab: Deploying AWS Service Control Policies (SCPs) via Terraform","pathname":"/academy/aws-security-cookbook-by-tyler/aws-service-control-policies-scps/lab-deploying-aws-service-control-policies-scps-via-terraform","siteSpaceId":"sitesp_ld3Wa","description":"How to deploy AWS Service Control Policies via Terraform","breadcrumbs":[{"label":"Academy","emoji":"1f393"},{"label":"AWS Security Cookbook by Tyler"},{"label":"AWS Service Control Policies (SCPs)"}]},{"id":"CqOR351yXyH6wSqt05EG","title":"AWS Declarative Policies","pathname":"/academy/aws-security-cookbook-by-tyler/aws-declarative-policies","siteSpaceId":"sitesp_ld3Wa","description":"An overview of AWS Declarative Policies","breadcrumbs":[{"label":"Academy","emoji":"1f393"},{"label":"AWS Security Cookbook by Tyler"}]},{"id":"wg38gdaIqHgvzNV59ikR","title":"Running LLMs Locally","pathname":"/ai/running-llms-locally","siteSpaceId":"sitesp_ld3Wa","description":"How to run LLMs locally","breadcrumbs":[{"label":"AI","emoji":"1f916"}]},{"id":"zDd8fjU8pJAAdY961eso","title":"Choosing Models Based on Hardware","pathname":"/ai/running-llms-locally/choosing-models-based-on-hardware","siteSpaceId":"sitesp_ld3Wa","description":"Calculator for identifying LLMs that can be run locally","breadcrumbs":[{"label":"AI","emoji":"1f916"},{"label":"Running LLMs Locally"}]},{"id":"LMwb94MQEl51Fa24H0zJ","title":"LM Studio","pathname":"/ai/running-llms-locally/lm-studio","siteSpaceId":"sitesp_ld3Wa","description":"How to run LLMs locally with LM Studio","breadcrumbs":[{"label":"AI","emoji":"1f916"},{"label":"Running LLMs Locally"}]},{"id":"5TXWgvACoRqDbgYjrWd4","title":"Ollama","pathname":"/ai/running-llms-locally/ollama","siteSpaceId":"sitesp_ld3Wa","description":"How to run LLMs locally with Ollama","breadcrumbs":[{"label":"AI","emoji":"1f916"},{"label":"Running LLMs Locally"}]},{"id":"oJjkrb88XwaTcDnqsyCB","title":"Claude Code with Local LLM","pathname":"/ai/running-llms-locally/claude-code-with-local-llm","siteSpaceId":"sitesp_ld3Wa","description":"How to configure Claude Code with a local LLM","breadcrumbs":[{"label":"AI","emoji":"1f916"},{"label":"Running LLMs Locally"}]},{"id":"YPvh8RTnFuUvnAGCbVFu","title":"Model Context Protocol (MCP)","pathname":"/ai/model-context-protocol-mcp","siteSpaceId":"sitesp_ld3Wa","description":"How to setup and use MCP servers","breadcrumbs":[{"label":"AI","emoji":"1f916"}]},{"id":"7a8l0zq9leNc6Z0qNj4s","title":"AWS Terraform MCP Server","pathname":"/ai/model-context-protocol-mcp/aws-terraform-mcp-server","siteSpaceId":"sitesp_ld3Wa","description":"How to setup AWS's Terraform MCP Server","breadcrumbs":[{"label":"AI","emoji":"1f916"},{"label":"Model Context Protocol (MCP)"}]},{"id":"x0HAezOQOnCaym0sXlSo","title":"Claude Code","pathname":"/ai/claude-code","siteSpaceId":"sitesp_ld3Wa","description":"Everything related to Claude Code","breadcrumbs":[{"label":"AI","emoji":"1f916"}]},{"id":"fwhy3maYcp18imxYcDtb","title":"AWS","pathname":"/cloud-security/aws","siteSpaceId":"sitesp_ld3Wa","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"}]},{"id":"nySUdbxFKDWoPSi0pZa6","title":"AWS Offensive Security","pathname":"/cloud-security/aws/aws-offensive-security","siteSpaceId":"sitesp_ld3Wa","description":"AWS offensive security tactics and techniques","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"AWS"}]},{"id":"ESdPbUCZdDPGlZhrYxQt","title":"AWS Attacks and Techniques","pathname":"/cloud-security/aws/aws-offensive-security/aws-attacks-and-techniques","siteSpaceId":"sitesp_ld3Wa","description":"Demonstrating various attacks that can be performed on AWS accounts and services","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"AWS"},{"label":"AWS Offensive Security"}]},{"id":"CXrJnnxtEXqu2b1SNqCC","title":"Data Poisoning - Bedrock Knowledge Base","pathname":"/cloud-security/aws/aws-offensive-security/aws-attacks-and-techniques/data-poisoning-bedrock-knowledge-base","siteSpaceId":"sitesp_ld3Wa","description":"How to poison Amazon Bedrock Knowledge Base","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"AWS"},{"label":"AWS Offensive Security"},{"label":"AWS Attacks and Techniques"}]},{"id":"nwich05N7zAGk9uXkcyL","title":"Enumerate AWS Organization ID","pathname":"/cloud-security/aws/aws-offensive-security/aws-attacks-and-techniques/enumerate-aws-organization-id","siteSpaceId":"sitesp_ld3Wa","description":"How to enumerate the AWS Organization ID","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"AWS"},{"label":"AWS Offensive Security"},{"label":"AWS Attacks and Techniques"}]},{"id":"d7lHYd8keeqxRnkkH4Fx","title":"Enumerate AWS Account IDs","pathname":"/cloud-security/aws/aws-offensive-security/aws-attacks-and-techniques/enumerate-aws-account-ids","siteSpaceId":"sitesp_ld3Wa","description":"To maintain security, AWS Account IDs should be handled carefully, even though they are not deemed confidential. While they are not secrets, they can lead to exposure of sensitive resources or data.","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"AWS"},{"label":"AWS Offensive Security"},{"label":"AWS Attacks and Techniques"}]},{"id":"DiEtFfQrVu6cMS1ZEsbP","title":"Enumerate AWS IAM Users","pathname":"/cloud-security/aws/aws-offensive-security/aws-attacks-and-techniques/enumerate-aws-iam-users","siteSpaceId":"sitesp_ld3Wa","description":"Exposure of AWS IAM Usernames can further aid attackers efforts to access an AWS account. Exposure leaves users vulnerable to attacks such as phishing and password-spraying.","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"AWS"},{"label":"AWS Offensive Security"},{"label":"AWS Attacks and Techniques"}]},{"id":"pSQ8NnEl3RQ0qm3qDIFE","title":"Enumerate (Unauthenticated) IAM Users and Roles","pathname":"/cloud-security/aws/aws-offensive-security/aws-attacks-and-techniques/enumerate-unauthenticated-iam-users-and-roles","siteSpaceId":"sitesp_ld3Wa","description":"Exploiting an AWS feature of the IAM Role Trust Policy allowing for unauthenticated enumeration of AWS IAM Users and Roles in AWS Accounts.","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"AWS"},{"label":"AWS Offensive Security"},{"label":"AWS Attacks and Techniques"}]},{"id":"kfxlrb8vvhs8ySrWbiir","title":"Enumerate AWS Public Resources","pathname":"/cloud-security/aws/aws-offensive-security/aws-attacks-and-techniques/enumerate-aws-public-resources","siteSpaceId":"sitesp_ld3Wa","description":"Public resources like EBS and RDS snapshots or SSM Documents can lead to data and credential leaks.","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"AWS"},{"label":"AWS Offensive Security"},{"label":"AWS Attacks and Techniques"}]},{"id":"tL8qJ7VrRiyIlNHJaYq0","title":"Enumerate Secrets in AWS","pathname":"/cloud-security/aws/aws-offensive-security/aws-attacks-and-techniques/enumerate-secrets-in-aws","siteSpaceId":"sitesp_ld3Wa","description":"Tips and tricks for discovering secrets in AWS","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"AWS"},{"label":"AWS Offensive Security"},{"label":"AWS Attacks and Techniques"}]},{"id":"FsRaM4lV4hu8Si6ocuA6","title":"Generate AWS Console Session","pathname":"/cloud-security/aws/aws-offensive-security/aws-attacks-and-techniques/generate-aws-console-session","siteSpaceId":"sitesp_ld3Wa","description":"Get access to the AWS console with AWS access keys","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"AWS"},{"label":"AWS Offensive Security"},{"label":"AWS Attacks and Techniques"}]},{"id":"K72U8XIhZnjbfsTmZRAk","title":"Generate IAM Access Keys from CloudShell","pathname":"/cloud-security/aws/aws-offensive-security/aws-attacks-and-techniques/generate-iam-access-keys-from-cloudshell","siteSpaceId":"sitesp_ld3Wa","description":"Using an undocumented endpoint, we can leverage CloudShell from the AWS Console and create AWS Access Keys for the logged on user.","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"AWS"},{"label":"AWS Offensive Security"},{"label":"AWS Attacks and Techniques"}]},{"id":"sqa4shrdyLjZz6f8a5ks","title":"Password Spraying AWS IAM Users","pathname":"/cloud-security/aws/aws-offensive-security/aws-attacks-and-techniques/password-spraying-aws-iam-users","siteSpaceId":"sitesp_ld3Wa","description":"Performing password spray attacks against AWS console users can lead to successful credentials validation and, in turn, access to the AWS user and AWS account.","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"AWS"},{"label":"AWS Offensive Security"},{"label":"AWS Attacks and Techniques"}]},{"id":"FXcQrC5G1MEQOELECxCo","title":"Server Side Request Forgery (SSRF)","pathname":"/cloud-security/aws/aws-offensive-security/aws-attacks-and-techniques/server-side-request-forgery-ssrf","siteSpaceId":"sitesp_ld3Wa","description":"Server Side Request Forgery attacks can lead to the compromising of AWS EC2 IAM Roles","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"AWS"},{"label":"AWS Offensive Security"},{"label":"AWS Attacks and Techniques"}]},{"id":"FOGvoGPDst8HRDd1Thpg","title":"Subdomain Takeovers","pathname":"/cloud-security/aws/aws-offensive-security/aws-attacks-and-techniques/subdomain-takeovers","siteSpaceId":"sitesp_ld3Wa","description":"Compromise a subdomain by taking over resources no longer existing","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"AWS"},{"label":"AWS Offensive Security"},{"label":"AWS Attacks and Techniques"}]},{"id":"lqx10PeOIdflDxKskAaI","title":"AWS Defense Evasion","pathname":"/cloud-security/aws/aws-offensive-security/aws-defense-evasion","siteSpaceId":"sitesp_ld3Wa","description":"Techniques attackers use to avoid detection","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"AWS"},{"label":"AWS Offensive Security"}]},{"id":"ZmWxNxTVxKlqIfw0p6Xo","title":"CloudTrail Tampering","pathname":"/cloud-security/aws/aws-offensive-security/aws-defense-evasion/cloudtrail-tampering","siteSpaceId":"sitesp_ld3Wa","description":"Techniques for avoiding CloudTrail detection","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"AWS"},{"label":"AWS Offensive Security"},{"label":"AWS Defense Evasion"}]},{"id":"E54vqBbXbcaRDpSJTF3Y","title":"GuardDuty Tampering","pathname":"/cloud-security/aws/aws-offensive-security/aws-defense-evasion/guardduty-tampering","siteSpaceId":"sitesp_ld3Wa","description":"Techniques for avoiding and disabling GuardDuty detection","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"AWS"},{"label":"AWS Offensive Security"},{"label":"AWS Defense Evasion"}]},{"id":"VBjJGzqYlo2L8Pp0r1Pt","title":"Undocumented AWS APIs","pathname":"/cloud-security/aws/aws-offensive-security/aws-defense-evasion/undocumented-aws-apis","siteSpaceId":"sitesp_ld3Wa","description":"Techniques for avoiding CloudTrail detection","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"AWS"},{"label":"AWS Offensive Security"},{"label":"AWS Defense Evasion"}]},{"id":"MV7WCg9M6xrygS3Pb7nV","title":"Nonproduction API Endpoints","pathname":"/cloud-security/aws/aws-offensive-security/aws-defense-evasion/nonproduction-api-endpoints","siteSpaceId":"sitesp_ld3Wa","description":"Techniques for avoiding CloudTrail detection","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"AWS"},{"label":"AWS Offensive Security"},{"label":"AWS Defense Evasion"}]},{"id":"3Rem2GkyJnFi62ogxfnX","title":"AWS Persistence","pathname":"/cloud-security/aws/aws-offensive-security/aws-persistence","siteSpaceId":"sitesp_ld3Wa","description":"Techniques threat actors use to maintain persistence in an AWS environment","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"AWS"},{"label":"AWS Offensive Security"}]},{"id":"cfMxZS0U3Xme0TIqmraM","title":"Generate IAM Access Keys from CloudShell","pathname":"/cloud-security/aws/aws-offensive-security/aws-persistence/generate-iam-access-keys-from-cloudshell","siteSpaceId":"sitesp_ld3Wa","description":"AWS persistence technique","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"AWS"},{"label":"AWS Offensive Security"},{"label":"AWS Persistence"}]},{"id":"ylXkvyqBW49S5uD0VNYZ","title":"Creating IAM Access Keys","pathname":"/cloud-security/aws/aws-offensive-security/aws-persistence/creating-iam-access-keys","siteSpaceId":"sitesp_ld3Wa","description":"AWS persistence technique","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"AWS"},{"label":"AWS Offensive Security"},{"label":"AWS Persistence"}]},{"id":"yNox1xnqorQ01oWZo4F1","title":"Backdoor an IAM Role","pathname":"/cloud-security/aws/aws-offensive-security/aws-persistence/backdoor-an-iam-role","siteSpaceId":"sitesp_ld3Wa","description":"AWS persistence technique","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"AWS"},{"label":"AWS Offensive Security"},{"label":"AWS Persistence"}]},{"id":"MKI6C6i6p9is7GTzUV7M","title":"Generating Temporary AWS Credentials from IAM User","pathname":"/cloud-security/aws/aws-offensive-security/aws-persistence/generating-temporary-aws-credentials-from-iam-user","siteSpaceId":"sitesp_ld3Wa","description":"AWS persistence technique","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"AWS"},{"label":"AWS Offensive Security"},{"label":"AWS Persistence"}]},{"id":"EaRqat9fy9RUlgaMhr21","title":"Generating Temporary Credentials from SSO Credentials File","pathname":"/cloud-security/aws/aws-offensive-security/aws-persistence/generating-temporary-credentials-from-sso-credentials-file","siteSpaceId":"sitesp_ld3Wa","description":"AWS persistence technique","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"AWS"},{"label":"AWS Offensive Security"},{"label":"AWS Persistence"}]},{"id":"iTjEKqFjuHc2mgoVoSng","title":"AWS Privilege Escalation","pathname":"/cloud-security/aws/aws-offensive-security/aws-privilege-escalation","siteSpaceId":"sitesp_ld3Wa","description":"Leveraging AWS permissions for privilege escalation and compromise","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"AWS"},{"label":"AWS Offensive Security"}]},{"id":"4RwHm6lbi58O2f7g3Ffa","title":"EC2","pathname":"/cloud-security/aws/aws-offensive-security/aws-privilege-escalation/ec2","siteSpaceId":"sitesp_ld3Wa","description":"Abusable AWS EC2 permissions that can lead to compromise or privilege escalation","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"AWS"},{"label":"AWS Offensive Security"},{"label":"AWS Privilege Escalation"}]},{"id":"5jn8cSARHJdAGtsCCfYu","title":"Elastic Container Registry (ECR)","pathname":"/cloud-security/aws/aws-offensive-security/aws-privilege-escalation/elastic-container-registry-ecr","siteSpaceId":"sitesp_ld3Wa","description":"Abusable Amazon ECR permissions that can lead to compromise or privilege escalation","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"AWS"},{"label":"AWS Offensive Security"},{"label":"AWS Privilege Escalation"}]},{"id":"GV2kL55aU7XilFQDWoXE","title":"Identity Access Management (IAM)","pathname":"/cloud-security/aws/aws-offensive-security/aws-privilege-escalation/permissions-abuse","siteSpaceId":"sitesp_ld3Wa","description":"Abusable AWS IAM permissions that can lead to compromise or privilege escalation","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"AWS"},{"label":"AWS Offensive Security"},{"label":"AWS Privilege Escalation"}]},{"id":"4WBWi1COqE3dVX6TqQPo","title":"IAM Trust Policies","pathname":"/cloud-security/aws/aws-offensive-security/aws-privilege-escalation/attacks-techniques-and-tools","siteSpaceId":"sitesp_ld3Wa","description":"Abusable AWS IAM Trust Policies that can lead to compromise or privilege escalation","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"AWS"},{"label":"AWS Offensive Security"},{"label":"AWS Privilege Escalation"}]},{"id":"nUX9v8RvjGAR8cCHmRNQ","title":"Key Management Service (KMS)","pathname":"/cloud-security/aws/aws-offensive-security/aws-privilege-escalation/permissions-abuse-1","siteSpaceId":"sitesp_ld3Wa","description":"Abusable AWS KMS permissions that can lead to compromise or privilege escalation","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"AWS"},{"label":"AWS Offensive Security"},{"label":"AWS Privilege Escalation"}]},{"id":"cnnKHQ5La8s3oWk6FKfV","title":"Lightsail","pathname":"/cloud-security/aws/aws-offensive-security/aws-privilege-escalation/lightsail","siteSpaceId":"sitesp_ld3Wa","description":"Abusable AWS Secrets Manager permissions that can lead to compromise or privilege escalation","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"AWS"},{"label":"AWS Offensive Security"},{"label":"AWS Privilege Escalation"}]},{"id":"B7KT9OPln1AX4ZvoF304","title":"OpenID Connect (OIDC)","pathname":"/cloud-security/aws/aws-offensive-security/aws-privilege-escalation/openid-connect-oidc","siteSpaceId":"sitesp_ld3Wa","description":"Abusing default or poorly configured Identity Provider IAM Trust Policies for privilege escalation","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"AWS"},{"label":"AWS Offensive Security"},{"label":"AWS Privilege Escalation"}]},{"id":"81O7pP1K7MmB2sBNyKJA","title":"RDS","pathname":"/cloud-security/aws/aws-offensive-security/aws-privilege-escalation/rds","siteSpaceId":"sitesp_ld3Wa","description":"Abusable AWS EC2 permissions that can lead to compromise or privilege escalation","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"AWS"},{"label":"AWS Offensive Security"},{"label":"AWS Privilege Escalation"}]},{"id":"NbsEAs27kFgWrV4GzQyc","title":"S3","pathname":"/cloud-security/aws/aws-offensive-security/aws-privilege-escalation/permissions-abuse-2","siteSpaceId":"sitesp_ld3Wa","description":"Abusable AWS S3 permissions that can lead to compromise or privilege escalation","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"AWS"},{"label":"AWS Offensive Security"},{"label":"AWS Privilege Escalation"}]},{"id":"DkrukxfVqLohAffOMXUh","title":"Secrets Manager","pathname":"/cloud-security/aws/aws-offensive-security/aws-privilege-escalation/secrets-manager","siteSpaceId":"sitesp_ld3Wa","description":"Abusable AWS Secrets Manager permissions that can lead to compromise or privilege escalation","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"AWS"},{"label":"AWS Offensive Security"},{"label":"AWS Privilege Escalation"}]},{"id":"P3opywPTmF56o7jemoVo","title":"Security Token Service (STS)","pathname":"/cloud-security/aws/aws-offensive-security/aws-privilege-escalation/sts","siteSpaceId":"sitesp_ld3Wa","description":"Abusable AWS STS permissions that can lead to compromise or privilege escalation","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"AWS"},{"label":"AWS Offensive Security"},{"label":"AWS Privilege Escalation"}]},{"id":"RR0UcpRMWlBy94HODbeg","title":"AWS Defensive Security","pathname":"/cloud-security/aws/aws-defensive-security","siteSpaceId":"sitesp_ld3Wa","description":"AWS defensive security tactics and techniques","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"AWS"}]},{"id":"Y10vO5RxIEfhvnTFnxdW","title":"AWS Organizations","pathname":"/cloud-security/aws/aws-defensive-security/aws-organizations","siteSpaceId":"sitesp_ld3Wa","description":"Capabilities related to and enabled by AWS Organizations","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"AWS"},{"label":"AWS Defensive Security"}]},{"id":"zPDnoJWTcDt8JnYc0b5s","title":"Declarative Policies","pathname":"/cloud-security/aws/aws-defensive-security/aws-organizations/declarative-policies","siteSpaceId":"sitesp_ld3Wa","description":"Centrally declare and enforce your desired configuration for a given AWS service at scale across an organization","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"AWS"},{"label":"AWS Defensive Security"},{"label":"AWS Organizations"}]},{"id":"Imqk2yOypnBWh4jNN5X9","title":"AWS Incident Response","pathname":"/cloud-security/aws/aws-incident-response","siteSpaceId":"sitesp_ld3Wa","description":"Responding to AWS-related incidents","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"AWS"}]},{"id":"NiicaUnllGfwQ8RTe3oP","title":"Compromised IAM Credentials","pathname":"/cloud-security/aws/aws-incident-response/compromised-iam-credentials","siteSpaceId":"sitesp_ld3Wa","description":"How to respond to compromised IAM Credentials","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"AWS"},{"label":"AWS Incident Response"}]},{"id":"JU0zGCZvmtHc2sIjJWgz","title":"AWS Threat Matrix","pathname":"/cloud-security/aws/aws-threat-matrix","siteSpaceId":"sitesp_ld3Wa","description":"AWS attacks and techniques aligned to MITRE ATT&CK Matrix","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"AWS"}]},{"id":"V0A94mSMODSzaXnVLX8m","title":"AWS Services Info","pathname":"/cloud-security/aws/aws","siteSpaceId":"sitesp_ld3Wa","description":"General information about AWS and its services","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"AWS"}]},{"id":"q0XAIbfWZlSvHRARhMUv","title":"AI / Machine Learning","pathname":"/cloud-security/aws/aws/ai-machine-learning","siteSpaceId":"sitesp_ld3Wa","description":"AWS AI and Machine Learning Related Services","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"AWS"},{"label":"AWS Services Info"}]},{"id":"j7xfoH4ka6lRyVUn6Wxx","title":"Amazon Bedrock","pathname":"/cloud-security/aws/aws/ai-machine-learning/amazon-bedrock","siteSpaceId":"sitesp_ld3Wa","description":"Amazon Bedrock overview, attacks, and mitigations.","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"AWS"},{"label":"AWS Services Info"},{"label":"AI / Machine Learning"}]},{"id":"3bJzwxR5eoUpz4FOoIc6","title":"Compute","pathname":"/cloud-security/aws/aws/compute","siteSpaceId":"sitesp_ld3Wa","description":"AWS Compute-Related Services","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"AWS"},{"label":"AWS Services Info"}]},{"id":"s8XBiyt27oDXKjpeDmJm","title":"EC2","pathname":"/cloud-security/aws/aws/compute/ec2","siteSpaceId":"sitesp_ld3Wa","description":"EC2 overview and attacks","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"AWS"},{"label":"AWS Services Info"},{"label":"Compute"}]},{"id":"OINFNcbYDBjl03heKPkH","title":"Containers","pathname":"/cloud-security/aws/aws/containers","siteSpaceId":"sitesp_ld3Wa","description":"AWS Container-Related Services","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"AWS"},{"label":"AWS Services Info"}]},{"id":"KBjykVCpDomHPzPWCsJW","title":"Elastic Container Registry (ECR)","pathname":"/cloud-security/aws/aws/containers/elastic-container-registry-ecr","siteSpaceId":"sitesp_ld3Wa","description":"General information about Elastic Container Registry","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"AWS"},{"label":"AWS Services Info"},{"label":"Containers"}]},{"id":"BlNGOmVKJ697DJnjuCDs","title":"Database","pathname":"/cloud-security/aws/aws/database","siteSpaceId":"sitesp_ld3Wa","description":"AWS Database-Related Services","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"AWS"},{"label":"AWS Services Info"}]},{"id":"JI5oQoJC9jLy8WrFxU91","title":"RDS","pathname":"/cloud-security/aws/aws/database/rds","siteSpaceId":"sitesp_ld3Wa","description":"RDS overview","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"AWS"},{"label":"AWS Services Info"},{"label":"Database"}]},{"id":"Bw5A1Na5rHebQnSwKAVx","title":"Security","pathname":"/cloud-security/aws/aws/security","siteSpaceId":"sitesp_ld3Wa","description":"AWS Security-Related Services","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"AWS"},{"label":"AWS Services Info"}]},{"id":"WQcaJZExJN4L6UuB2uDb","title":"IAM","pathname":"/cloud-security/aws/aws/security/iam","siteSpaceId":"sitesp_ld3Wa","description":"IAM overview","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"AWS"},{"label":"AWS Services Info"},{"label":"Security"}]},{"id":"KMgSrHFYWqgWKnpMNOqq","title":"KMS","pathname":"/cloud-security/aws/aws/security/kms","siteSpaceId":"sitesp_ld3Wa","description":"KMS overview and attacks","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"AWS"},{"label":"AWS Services Info"},{"label":"Security"}]},{"id":"WItdWMUikqmeghPVp81V","title":"Serverless","pathname":"/cloud-security/aws/aws/serverless","siteSpaceId":"sitesp_ld3Wa","description":"AWS Serverless-Related Services","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"AWS"},{"label":"AWS Services Info"}]},{"id":"OJpgrJDOPbAUg41Us4gF","title":"SNS Topic","pathname":"/cloud-security/aws/aws/serverless/sns-topic","siteSpaceId":"sitesp_ld3Wa","description":"SNS overview and attacks","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"AWS"},{"label":"AWS Services Info"},{"label":"Serverless"}]},{"id":"AWJHYkBz1XZ99emjDmOp","title":"Storage","pathname":"/cloud-security/aws/aws/storage","siteSpaceId":"sitesp_ld3Wa","description":"AWS Storage-Related Services","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"AWS"},{"label":"AWS Services Info"}]},{"id":"K3BsIZx4ZwqPDoGswW8f","title":"S3","pathname":"/cloud-security/aws/aws/storage/general-info","siteSpaceId":"sitesp_ld3Wa","description":"General information about AWS S3","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"AWS"},{"label":"AWS Services Info"},{"label":"Storage"}]},{"id":"fO3zPQlLKfCY63p4LYJt","title":"AWS CLI Cheat Sheet","pathname":"/cloud-security/aws/cli-cheat-sheet","siteSpaceId":"sitesp_ld3Wa","description":"Quick reference for commonly used commands","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"AWS"}]},{"id":"o2YsHcXkmKMsJgxuPDe3","title":"Azure","pathname":"/cloud-security/azure","siteSpaceId":"sitesp_ld3Wa","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"}]},{"id":"EdTNFyVimi9EIUEpDjb7","title":"Azure CLI Cheat Sheet","pathname":"/cloud-security/azure/azure-cli-cheat-sheet","siteSpaceId":"sitesp_ld3Wa","description":"Quick reference for commonly used commands","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"Azure"}]},{"id":"UuzBT3jI3yc7da6VGl6b","title":"Azure Overview","pathname":"/cloud-security/azure/azure-overview","siteSpaceId":"sitesp_ld3Wa","description":"An overview of Azure's architecture","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"Azure"}]},{"id":"v66vyQtwDYUsLompvcJD","title":"Azure Identity & Access Management","pathname":"/cloud-security/azure/azure-identity-and-access-management","siteSpaceId":"sitesp_ld3Wa","description":"An overview of Azure IAM","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"Azure"}]},{"id":"F1DhNnnjDtonObwPZGmK","title":"Azure Offensive Security","pathname":"/cloud-security/azure/azure-offensive-security","siteSpaceId":"sitesp_ld3Wa","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"Azure"}]},{"id":"4nE7QeKbVCFh1NoUJSv6","title":"Azure Attacks and Techniques","pathname":"/cloud-security/azure/azure-offensive-security/azure-attacks-and-techniques","siteSpaceId":"sitesp_ld3Wa","description":"Demonstrating various attacks that can be performed on Azure","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"Azure"},{"label":"Azure Offensive Security"}]},{"id":"tvnbhsgTsqR0sA8H1jZK","title":"Discover if Domain Associated with Entra ID / Microsoft 365","pathname":"/cloud-security/azure/azure-offensive-security/azure-attacks-and-techniques/discover-if-domain-associated-with-entra-id-microsoft-365","siteSpaceId":"sitesp_ld3Wa","description":"How to determine if a domain leverages Entra ID","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"Azure"},{"label":"Azure Offensive Security"},{"label":"Azure Attacks and Techniques"}]},{"id":"5yhV8c4KwlGOBoaA43LZ","title":"Discover Entra ID Tenant ID","pathname":"/cloud-security/azure/azure-offensive-security/azure-attacks-and-techniques/discover-entra-id-tenant-id","siteSpaceId":"sitesp_ld3Wa","description":"How to discover an Entra ID Tenant ID","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"Azure"},{"label":"Azure Offensive Security"},{"label":"Azure Attacks and Techniques"}]},{"id":"FYh4ZChkxK8z0qbZg1MN","title":"Azure Privilege Escalation","pathname":"/cloud-security/azure/azure-offensive-security/azure-privilege-escalation","siteSpaceId":"sitesp_ld3Wa","description":"Leveraging Azure permissions for privilege escalation and compromise","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"Azure"},{"label":"Azure Offensive Security"}]},{"id":"x9amvTABhYuk1idnOT2Q","title":"SQL Database","pathname":"/cloud-security/azure/azure-offensive-security/azure-privilege-escalation/sql-database","siteSpaceId":"sitesp_ld3Wa","description":"Abusable Azure SQL Database permissions that can lead to compromise or privilege escalation","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"Azure"},{"label":"Azure Offensive Security"},{"label":"Azure Privilege Escalation"}]},{"id":"LcP9l0QTw5Ljl9CEHZCC","title":"Azure Services Info","pathname":"/cloud-security/azure/azure-services-info","siteSpaceId":"sitesp_ld3Wa","description":"General information about Azure and its services","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"Azure"}]},{"id":"OhzhRArY6ZjZKADiDJOr","title":"Compute","pathname":"/cloud-security/azure/azure-services-info/compute","siteSpaceId":"sitesp_ld3Wa","description":"Azure Compute-Related Services","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"Azure"},{"label":"Azure Services Info"}]},{"id":"16inkM9CFOkUexECyve8","title":"Azure Virtual Machines","pathname":"/cloud-security/azure/azure-services-info/compute/azure-virtual-machines","siteSpaceId":"sitesp_ld3Wa","description":"Overview of the Azure Virtual Machines service","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"Azure"},{"label":"Azure Services Info"},{"label":"Compute"}]},{"id":"9Gi5R6UKh862JEGDaGvu","title":"Databases","pathname":"/cloud-security/azure/azure-services-info/databases","siteSpaceId":"sitesp_ld3Wa","description":"Azure Database-Related Services","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"Azure"},{"label":"Azure Services Info"}]},{"id":"cEtroifYYkofElo4vHn4","title":"Azure SQL Database","pathname":"/cloud-security/azure/azure-services-info/databases/azure-sql-database","siteSpaceId":"sitesp_ld3Wa","description":"Overview of the Azure SQL Database service","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"Azure"},{"label":"Azure Services Info"},{"label":"Databases"}]},{"id":"tizKkuNQr06TenKXk0Uz","title":"Security","pathname":"/cloud-security/azure/azure-services-info/security","siteSpaceId":"sitesp_ld3Wa","description":"Azure Security-Related Services","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"Azure"},{"label":"Azure Services Info"}]},{"id":"Vru2x7uOiXdsGOAnDyQ0","title":"Azure Key Vault","pathname":"/cloud-security/azure/azure-services-info/security/azure-key-vault","siteSpaceId":"sitesp_ld3Wa","description":"Overview of the Azure Key Vault service","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"Azure"},{"label":"Azure Services Info"},{"label":"Security"}]},{"id":"sAO2DryAraGaKrmhSYl9","title":"Storage","pathname":"/cloud-security/azure/azure-services-info/storage","siteSpaceId":"sitesp_ld3Wa","description":"Azure Storage-Related Services","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"Azure"},{"label":"Azure Services Info"}]},{"id":"esXwWonYgQNj3t9RMicb","title":"Azure Storage Account","pathname":"/cloud-security/azure/azure-services-info/storage/azure-storage-account","siteSpaceId":"sitesp_ld3Wa","description":"Overview of the Azure Storage Account service","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"Azure"},{"label":"Azure Services Info"},{"label":"Storage"}]},{"id":"Nxcqn2NzVWJaMK0WFRN6","title":"Azure Blob Storage","pathname":"/cloud-security/azure/azure-services-info/storage/azure-blob-storage","siteSpaceId":"sitesp_ld3Wa","description":"Overview of the Azure Blob Storage service","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"Azure"},{"label":"Azure Services Info"},{"label":"Storage"}]},{"id":"LidEG332jpWXiAiTbES8","title":"Capture the Flags (CTFs)","pathname":"/cloud-security/capture-the-flags-ctfs","siteSpaceId":"sitesp_ld3Wa","description":"A collection of CTF writeups","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"}]},{"id":"aXKE2eUYrsIx0tXKoaDE","title":"Flaws.Cloud","pathname":"/cloud-security/capture-the-flags-ctfs/flaws.cloud","siteSpaceId":"sitesp_ld3Wa","description":"A walkthrough of the CTF Flaws.Cloud","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"Capture the Flags (CTFs)"}]},{"id":"oIvvz50PAYvGUOAdW1Xw","title":"Level 1","pathname":"/cloud-security/capture-the-flags-ctfs/flaws.cloud/level-1","siteSpaceId":"sitesp_ld3Wa","description":"A CTF walkthrough for level 1 of Flaws.Cloud","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"Capture the Flags (CTFs)"},{"label":"Flaws.Cloud"}]},{"id":"XeAdR66m0nXq9JZ5cJM1","title":"Level 2","pathname":"/cloud-security/capture-the-flags-ctfs/flaws.cloud/level-2","siteSpaceId":"sitesp_ld3Wa","description":"A CTF walkthrough for level 2 of Flaws.Cloud","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"Capture the Flags (CTFs)"},{"label":"Flaws.Cloud"}]},{"id":"orgZ9Xw8YRwMrGusNXwO","title":"Level 3","pathname":"/cloud-security/capture-the-flags-ctfs/flaws.cloud/level-3","siteSpaceId":"sitesp_ld3Wa","description":"A CTF walkthrough for level 3 of Flaws.Cloud","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"Capture the Flags (CTFs)"},{"label":"Flaws.Cloud"}]},{"id":"AkIlF2pW72TXAYxEIjU5","title":"Level 4","pathname":"/cloud-security/capture-the-flags-ctfs/flaws.cloud/level-4","siteSpaceId":"sitesp_ld3Wa","description":"A CTF walkthrough for level 4 of Flaws.Cloud","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"Capture the Flags (CTFs)"},{"label":"Flaws.Cloud"}]},{"id":"7bmhBhJbm2za6IZfX8Fr","title":"Level 5","pathname":"/cloud-security/capture-the-flags-ctfs/flaws.cloud/level-5","siteSpaceId":"sitesp_ld3Wa","description":"A CTF walkthrough for level 5 of Flaws.Cloud","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"Capture the Flags (CTFs)"},{"label":"Flaws.Cloud"}]},{"id":"v4XqdJYzHtPT83OAmJIf","title":"Level 6","pathname":"/cloud-security/capture-the-flags-ctfs/flaws.cloud/level-6","siteSpaceId":"sitesp_ld3Wa","description":"A CTF walkthrough for level 6 of Flaws.Cloud","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"Capture the Flags (CTFs)"},{"label":"Flaws.Cloud"}]},{"id":"Plt0Hn5Qbyd2ktXbkTSO","title":"PwnedLabs","pathname":"/cloud-security/capture-the-flags-ctfs/pwnedlabs","siteSpaceId":"sitesp_ld3Wa","description":"A collection of capture-the-flag walkthroughs from PwnedLabs.io","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"Capture the Flags (CTFs)"}]},{"id":"XMK8oPttyNIxtFq7KhrG","title":"Escalate Privileges by IAM Policy Rollback","pathname":"/cloud-security/capture-the-flags-ctfs/pwnedlabs/escalate-privileges-by-iam-policy-rollback","siteSpaceId":"sitesp_ld3Wa","description":"A walkthrough demonstrating how to abuse the IAM permission: SetDefaultPolicyVersion","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"Capture the Flags (CTFs)"},{"label":"PwnedLabs"}]},{"id":"UOfVior2hzslhDtRka7Q","title":"Exploiting Weak S3 Bucket Policies","pathname":"/cloud-security/capture-the-flags-ctfs/pwnedlabs/exploiting-weak-s3-bucket-policies","siteSpaceId":"sitesp_ld3Wa","description":"A walkthrough demonstrating how weak S3 Bucket policies can lead to system compromise, data exposure and exfiltration.","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"Capture the Flags (CTFs)"},{"label":"PwnedLabs"}]},{"id":"kyNSAZEzQN1oBWpcFT6h","title":"Leveraging S3 Bucket Versioning","pathname":"/cloud-security/capture-the-flags-ctfs/pwnedlabs/leveraging-s3-bucket-versioning","siteSpaceId":"sitesp_ld3Wa","description":"A walkthrough demonstrating how S3 Bucket Versioning can lead to data exposure and exfiltration.","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"Capture the Flags (CTFs)"},{"label":"PwnedLabs"}]},{"id":"bpkSO4mPzpgl0f1wWNkk","title":"S3 Enumeration Basics","pathname":"/cloud-security/capture-the-flags-ctfs/pwnedlabs/s3-enumeration-basics","siteSpaceId":"sitesp_ld3Wa","description":"A walkthrough demonstrating how to enumerate S3, exploit a misconfiguration, and escalate privileges to obtain sensitive data.","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"Capture the Flags (CTFs)"},{"label":"PwnedLabs"}]},{"id":"t0DbWxkUvWjCbAPQk85J","title":"Pillage Exposed RDS Instances","pathname":"/cloud-security/capture-the-flags-ctfs/pwnedlabs/pillage-exposed-rds-instances","siteSpaceId":"sitesp_ld3Wa","description":"A walkthrough demonstrating how to exfiltrate data from a public RDS instance.","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"Capture the Flags (CTFs)"},{"label":"PwnedLabs"}]},{"id":"8uiRMQ3GngH1FLU1x6st","title":"EC2 SSRF Attack","pathname":"/cloud-security/capture-the-flags-ctfs/pwnedlabs/ec2-ssrf-attack","siteSpaceId":"sitesp_ld3Wa","description":"A walkthrough demonstrating a Server Side Request Forgery attack leading to credit card data exfiltration.","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"Capture the Flags (CTFs)"},{"label":"PwnedLabs"}]},{"id":"OBBZQJ0Ks1urkFx4PoHU","title":"Hunt for Secrets in Git Repos","pathname":"/cloud-security/capture-the-flags-ctfs/pwnedlabs/hunt-for-secrets-in-git-repos","siteSpaceId":"sitesp_ld3Wa","description":"A walkthrough demonstrating the importance of preventing credentials being committed to git repositories.","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"Capture the Flags (CTFs)"},{"label":"PwnedLabs"}]},{"id":"GjBmtcvFSrLNwOWvyVJM","title":"Cybr","pathname":"/cloud-security/capture-the-flags-ctfs/cybr","siteSpaceId":"sitesp_ld3Wa","description":"A collection of capture-the-flag walkthroughs from cybr.com","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"Capture the Flags (CTFs)"}]},{"id":"DLK3W2Zxv1HsKUsBcnI6","title":"Challenge - Secrets Unleashed","pathname":"/cloud-security/capture-the-flags-ctfs/cybr/challenge-secrets-unleashed","siteSpaceId":"sitesp_ld3Wa","description":"A walkthrough demonstrating how to abuse and escalate IAM permissions.","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"Capture the Flags (CTFs)"},{"label":"Cybr"}]},{"id":"aQxEEuIXBnUVoYvCBqXV","title":"WIZ - The Ultimate Cloud Security Championship","pathname":"/cloud-security/capture-the-flags-ctfs/wiz-the-ultimate-cloud-security-championship","siteSpaceId":"sitesp_ld3Wa","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"Capture the Flags (CTFs)"}]},{"id":"EiOgwYcDdb9TeHiOloFy","title":"June 2025 - Perimeter Leak","pathname":"/cloud-security/capture-the-flags-ctfs/wiz-the-ultimate-cloud-security-championship/june-2025-perimeter-leak","siteSpaceId":"sitesp_ld3Wa","description":"A walkthrough of the WIZ Ultimate Cloud Security Championship for June 2025","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"Capture the Flags (CTFs)"},{"label":"WIZ - The Ultimate Cloud Security Championship"}]},{"id":"46M5TiDwYrL9JmRHFWKS","title":"Tools","pathname":"/cloud-security/tools","siteSpaceId":"sitesp_ld3Wa","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"}]},{"id":"WK7ChmygoGwCe9d39MTc","title":"Tooling Index","pathname":"/cloud-security/tools/tooling-index","siteSpaceId":"sitesp_ld3Wa","description":"Useful tools I've come across","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"Tools"}]},{"id":"SkkG0rgilUZVltkFq9P3","title":"dsnap","pathname":"/cloud-security/tools/dsnap","siteSpaceId":"sitesp_ld3Wa","description":"A tool for enumerating and downloading EBS snapshots","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"Tools"}]},{"id":"O19p1tGtilXIZ5jnG8oA","title":"Pacu","pathname":"/cloud-security/tools/pacu","siteSpaceId":"sitesp_ld3Wa","description":"Offensive security tool for exploiting configuration flaws in AWS","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"Tools"}]},{"id":"WLDq8RnvnftMaS7F0Edm","title":"s3-account-search","pathname":"/cloud-security/tools/s3-account-search","siteSpaceId":"sitesp_ld3Wa","description":"An overview of the tool s3-account-search which is able to accurately identify an AWS Account ID from an AWS S3 bucket name.","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"Tools"}]},{"id":"5wOKZi0PKtbqJakcb9ps","title":"GoAWSConsoleSpray","pathname":"/cloud-security/tools/goawsconsolespray","siteSpaceId":"sitesp_ld3Wa","description":"An overview of the tool GoAWSConsoleSpray which can password spray AWS IAM users.","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"Tools"}]},{"id":"M5nmqYIqMUZ5MdQAVeAj","title":"aws_consoler","pathname":"/cloud-security/tools/aws_consoler","siteSpaceId":"sitesp_ld3Wa","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"Tools"}]},{"id":"Mdp4EWVMh5rHdC3YTdTY","title":"cloudenum","pathname":"/cloud-security/tools/cloudenum","siteSpaceId":"sitesp_ld3Wa","breadcrumbs":[{"label":"Cloud Security","emoji":"2601"},{"label":"Tools"}]},{"id":"UBFZIqiO3lkteazvYp1x","title":"Kubernetes Threat Matrix","pathname":"/kubernetes-and-containers/kubernetes-threat-matrix","siteSpaceId":"sitesp_ld3Wa","description":"Kubernetes attacks and techniques aligned to MITRE ATT&CK Matrix","breadcrumbs":[{"label":"Kubernetes & Containers","icon":"dharmachakra"}]},{"id":"AHPcWSLBUEB4Fsu8lOeu","title":"Kubernetes General Info","pathname":"/kubernetes-and-containers/kubernetes-general-info","siteSpaceId":"sitesp_ld3Wa","breadcrumbs":[{"label":"Kubernetes & Containers","icon":"dharmachakra"}]},{"id":"BRgPCblT21caL2zbpUaU","title":"Architecture and Components","pathname":"/kubernetes-and-containers/kubernetes-general-info/architecture-and-components","siteSpaceId":"sitesp_ld3Wa","description":"An overview of Kubernetes' architecture and components","breadcrumbs":[{"label":"Kubernetes & Containers","icon":"dharmachakra"},{"label":"Kubernetes General Info"}]},{"id":"MtSadrUqdGxoeOCwHoG6","title":"Docker","pathname":"/kubernetes-and-containers/docker","siteSpaceId":"sitesp_ld3Wa","description":"Tips and tricks working with Docker","breadcrumbs":[{"label":"Kubernetes & Containers","icon":"dharmachakra"}]},{"id":"aurXHGQ90lUYbMcqUzn7","title":"CLI Tools","pathname":"/coding-and-cli-tooling/cli-tools","siteSpaceId":"sitesp_ld3Wa","description":"Tips and tricks for working with common CLI tooling","breadcrumbs":[{"label":"Coding & CLI Tooling","emoji":"1f468-1f4bb"}]},{"id":"mYLLmKzec1DUT19sWBua","title":"AWS CLI","pathname":"/coding-and-cli-tooling/cli-tools/aws-cli","siteSpaceId":"sitesp_ld3Wa","description":"Tips and tricks for working with the AWS CLI","breadcrumbs":[{"label":"Coding & CLI Tooling","emoji":"1f468-1f4bb"},{"label":"CLI Tools"}]},{"id":"5jpLV4TM9nt3GEanCqUA","title":"Git","pathname":"/coding-and-cli-tooling/cli-tools/git","siteSpaceId":"sitesp_ld3Wa","description":"What is Git and how to use it.","breadcrumbs":[{"label":"Coding & CLI Tooling","emoji":"1f468-1f4bb"},{"label":"CLI Tools"}]},{"id":"3kkHc99pYBJU263fcRJk","title":"GitHub Copilot (CLI)","pathname":"/coding-and-cli-tooling/cli-tools/github-copilot-cli","siteSpaceId":"sitesp_ld3Wa","description":"Tips and tricks for setting up and using GitHub Copilot with the CLI.","breadcrumbs":[{"label":"Coding & CLI Tooling","emoji":"1f468-1f4bb"},{"label":"CLI Tools"}]},{"id":"7QCGThJGMU5YRESTfvAZ","title":"Homebrew","pathname":"/coding-and-cli-tooling/cli-tools/homebrew","siteSpaceId":"sitesp_ld3Wa","description":"Tips and tricks for working with the best package manager for MacOS!","breadcrumbs":[{"label":"Coding & CLI Tooling","emoji":"1f468-1f4bb"},{"label":"CLI Tools"}]},{"id":"YTsQ6xJTyu8cna6QePvJ","title":"jq","pathname":"/coding-and-cli-tooling/cli-tools/jq","siteSpaceId":"sitesp_ld3Wa","description":"Tips and tricks for working with the jq command line utility","breadcrumbs":[{"label":"Coding & CLI Tooling","emoji":"1f468-1f4bb"},{"label":"CLI Tools"}]},{"id":"kakSAmTCEAGuRH694f0G","title":"ngrok","pathname":"/coding-and-cli-tooling/cli-tools/ngrok","siteSpaceId":"sitesp_ld3Wa","description":"Ngrok overview and setting up reverse shells","breadcrumbs":[{"label":"Coding & CLI Tooling","emoji":"1f468-1f4bb"},{"label":"CLI Tools"}]},{"id":"nlyBwNxFX3tnt7z2F2K5","title":"ssh","pathname":"/coding-and-cli-tooling/cli-tools/ssh","siteSpaceId":"sitesp_ld3Wa","description":"Tips and tricks for working with ssh","breadcrumbs":[{"label":"Coding & CLI Tooling","emoji":"1f468-1f4bb"},{"label":"CLI Tools"}]},{"id":"7ODvpeyHA6ifVS52UKOZ","title":"Coding and Scripting","pathname":"/coding-and-cli-tooling/coding-and-scripting","siteSpaceId":"sitesp_ld3Wa","breadcrumbs":[{"label":"Coding & CLI Tooling","emoji":"1f468-1f4bb"}]},{"id":"wsxzED4hYX3sRLOtTqJ3","title":"Bash","pathname":"/coding-and-cli-tooling/coding-and-scripting/bash","siteSpaceId":"sitesp_ld3Wa","description":"Useful bash commands","breadcrumbs":[{"label":"Coding & CLI Tooling","emoji":"1f468-1f4bb"},{"label":"Coding and Scripting"}]},{"id":"G4cYZhyDy5XxU60G6lRC","title":"Python","pathname":"/coding-and-cli-tooling/coding-and-scripting/python","siteSpaceId":"sitesp_ld3Wa","description":"Tips and tricks for working with Python","breadcrumbs":[{"label":"Coding & CLI Tooling","emoji":"1f468-1f4bb"},{"label":"Coding and Scripting"}]},{"id":"DyNrJ9gOWsmxIVyTGJRk","title":"Proxy Tooling","pathname":"/coding-and-cli-tooling/proxy-tooling","siteSpaceId":"sitesp_ld3Wa","description":"How to proxy CLI tools, code, and other apps","breadcrumbs":[{"label":"Coding & CLI Tooling","emoji":"1f468-1f4bb"}]},{"id":"DF9QfRXo1uIOEVFj7sSZ","title":"CI/CD","pathname":"/devsecops/ci-cd","siteSpaceId":"sitesp_ld3Wa","breadcrumbs":[{"label":"DevSecOps","emoji":"2699"}]},{"id":"tUFVWuL3htFekujMjaay","title":"GitLab","pathname":"/devsecops/ci-cd/gitlab","siteSpaceId":"sitesp_ld3Wa","description":"Configuring a gitlab pipeline file","breadcrumbs":[{"label":"DevSecOps","emoji":"2699"},{"label":"CI/CD"}]},{"id":"WaHp5J73LNfelwxkbr5G","title":"Hashicorp Terraform","pathname":"/devsecops/hashicorp-terraform","siteSpaceId":"sitesp_ld3Wa","description":"Get up and running with Terraform","breadcrumbs":[{"label":"DevSecOps","emoji":"2699"}]},{"id":"QLMYJAiBSD1UPgv3ztLj","title":"Hashicorp Vault","pathname":"/devsecops/hashicorp-vault","siteSpaceId":"sitesp_ld3Wa","description":"Hashicorp's solution to managing Secrets and Protecting Sensitive Data","breadcrumbs":[{"label":"DevSecOps","emoji":"2699"}]},{"id":"7HSm9595Jd7TIvOJ87Wn","title":"IAC Scanning","pathname":"/devsecops/iac-scanning","siteSpaceId":"sitesp_ld3Wa","description":"A collection of tools for performing security scans on infrastructure-as-code.","breadcrumbs":[{"label":"DevSecOps","emoji":"2699"}]},{"id":"BhAP2TznE5yjQJWzpoDY","title":"tfsec","pathname":"/devsecops/iac-scanning/tfsec","siteSpaceId":"sitesp_ld3Wa","description":"IAC scanning tool","breadcrumbs":[{"label":"DevSecOps","emoji":"2699"},{"label":"IAC Scanning"}]},{"id":"dE5bP3YOjR1A6baivY1t","title":"Secrets Scanning","pathname":"/devsecops/secrets-scanning","siteSpaceId":"sitesp_ld3Wa","description":"A collection of tools for scanning code for secrets.","breadcrumbs":[{"label":"DevSecOps","emoji":"2699"}]},{"id":"4uovxDlFuNUuww9YXlHr","title":"Trufflehog","pathname":"/devsecops/secrets-scanning/trufflehog","siteSpaceId":"sitesp_ld3Wa","description":"A tool for finding leaked credentials in code.","breadcrumbs":[{"label":"DevSecOps","emoji":"2699"},{"label":"Secrets Scanning"}]},{"id":"GygvEB3H9kokyx2DTUwn","title":"Linux","pathname":"/operating-systems/linux","siteSpaceId":"sitesp_ld3Wa","description":"An overview of Linux","breadcrumbs":[{"label":"Operating Systems","emoji":"1f4bb"}]},{"id":"aQbprzD5K2ts0pfV1e0U","title":"APT Package Manager","pathname":"/operating-systems/linux/apt-package-manager","siteSpaceId":"sitesp_ld3Wa","description":"Advanced Package Tool (APT)","breadcrumbs":[{"label":"Operating Systems","emoji":"1f4bb"},{"label":"Linux"}]},{"id":"BmsjE7sIWAwaVW9Lju54","title":"CLI Tools Cheat Sheet","pathname":"/operating-systems/linux/cli-tools-cheat-sheet","siteSpaceId":"sitesp_ld3Wa","description":"A cheat sheet for useful Linux CLI tools","breadcrumbs":[{"label":"Operating Systems","emoji":"1f4bb"},{"label":"Linux"}]},{"id":"McxOu7M4K2pwfeGZkoPM","title":"Man Pages","pathname":"/operating-systems/linux/man-pages","siteSpaceId":"sitesp_ld3Wa","description":"What are Linux Man Pages?","breadcrumbs":[{"label":"Operating Systems","emoji":"1f4bb"},{"label":"Linux"}]},{"id":"whEYjVQfhnwAc5HmoQNj","title":"Services","pathname":"/operating-systems/linux/services","siteSpaceId":"sitesp_ld3Wa","description":"What is a Linux service?","breadcrumbs":[{"label":"Operating Systems","emoji":"1f4bb"},{"label":"Linux"}]},{"id":"o8n5H5mRTKxGUFGIeuD1","title":"Users and Groups","pathname":"/operating-systems/linux/users-and-groups","siteSpaceId":"sitesp_ld3Wa","description":"Understanding Linux users and groups.","breadcrumbs":[{"label":"Operating Systems","emoji":"1f4bb"},{"label":"Linux"}]},{"id":"niKKykCWRetbKATukbIQ","title":"macOS","pathname":"/operating-systems/macos","siteSpaceId":"sitesp_ld3Wa","breadcrumbs":[{"label":"Operating Systems","emoji":"1f4bb"}]},{"id":"UFbPFt0X3zcqABWdQP0N","title":"Favorite Apps","pathname":"/operating-systems/macos/favorite-apps","siteSpaceId":"sitesp_ld3Wa","description":"Some favorite apps of mine","breadcrumbs":[{"label":"Operating Systems","emoji":"1f4bb"},{"label":"macOS"}]},{"id":"IWrgiiMo1DkR1MOheOzU","title":"Terminal Customization","pathname":"/operating-systems/macos/terminal-customization","siteSpaceId":"sitesp_ld3Wa","description":"How to improve default terminal experience","breadcrumbs":[{"label":"Operating Systems","emoji":"1f4bb"},{"label":"macOS"}]},{"id":"NTg6pc7RsxpdVon2xqQm","title":"TouchID for Sudo","pathname":"/operating-systems/macos/touchid-for-sudo","siteSpaceId":"sitesp_ld3Wa","description":"Enable TouchID when using Sudo","breadcrumbs":[{"label":"Operating Systems","emoji":"1f4bb"},{"label":"macOS"}]},{"id":"DbkZiVuuauRnRf4FakrF","title":"Jenkins","pathname":"/miscellaneous/jenkins","siteSpaceId":"sitesp_ld3Wa","description":"Random info about Jenkins","breadcrumbs":[{"label":"Miscellaneous","emoji":"1f381"}]},{"id":"qWm7gJz1kXOxgJCZ2aMH","title":"Active Directory Homelab Automation","pathname":"/projects/active-directory-homelab-automation","siteSpaceId":"sitesp_ld3Wa","description":"Scripts for automating an AD homelab and domain-joined workstation","breadcrumbs":[{"label":"Projects","emoji":"1f3d7"}]},{"id":"AnJA74sRW5O6z7XECXiW","title":"AWS Cloud Resume Challenge","pathname":"/projects/aws-cloud-resume-challenge","siteSpaceId":"sitesp_ld3Wa","description":"My serverless website hosted in AWS","breadcrumbs":[{"label":"Projects","emoji":"1f3d7"}]},{"id":"C0I0BppO5jyDBhxYhEhz","title":"Proxmox Homelab as Code","pathname":"/projects/proxmox-homelab-as-code","siteSpaceId":"sitesp_ld3Wa","description":"Utilizing Packer and Terraform to build a Proxmox homelab as code","breadcrumbs":[{"label":"Projects","emoji":"1f3d7"}]},{"id":"uWe7YfPbJ582BtirrU8Y","title":"Useful Resources","pathname":"/other/resources","siteSpaceId":"sitesp_ld3Wa","description":"Resources and Trainings I've come across","breadcrumbs":[{"label":"Other","emoji":"1f4cc"}]}]}