Pawel Rzepa

1.1K posts

Pawel Rzepa banner
Pawel Rzepa

Pawel Rzepa

@Rzepsky

Yet another sec guy, particularly interested in cloud security 🌩️ AWS Authorized Instructor at @awscloud Lead Ethical Hacker at @SoftServeInc

Polska Katılım Haziran 2015
679 Takip Edilen1.4K Takipçiler
Sabitlenmiş Tweet
Pawel Rzepa
Pawel Rzepa@Rzepsky·
🔥New blog post🔥 "#AWS privilege escalation: exploring odd features of the Trust Policy" a.k.a. how to assume an IAM role without "sts:AssumeRole" permission? rzepsky.medium.com/aws-privilege-…
English
5
99
240
0
Pawel Rzepa retweetledi
Nick Frichette
Nick Frichette@Frichette_n·
Denial of wallet attacks are a very real thing 😬I think the official solution to this is to front your S3 bucket with CloudFront. @maciej.pocwierz/how-an-empty-s3-bucket-can-make-your-aws-bill-explode-934a383cb8b1" target="_blank" rel="nofollow noopener">medium.com/@maciej.pocwie…
English
5
8
31
7.2K
Pawel Rzepa retweetledi
Aidan W Steele
Aidan W Steele@__steele·
AWS CloudShell got container functionality this week. This felt like an opportunity to do a deep(-ish) dive into how CloudShell works under the hood. I extracted some containers and listed some roles. I remembered that I suck at non-sequence diagrams. awsteele.com/blog/2024/01/1…
Aidan W Steele tweet media
English
8
25
77
11.9K
Pawel Rzepa retweetledi
Nir Ohfeld
Nir Ohfeld@nirohfeld·
Think you are an AWS IAM expert? 🤖 Put on your attacker hat and play our new CTF: The Big IAM Challenge! 🎉 wiz.io/blog/the-big-i…
English
1
18
86
22.9K
Pawel Rzepa retweetledi
Ronen Shustin
Ronen Shustin@ronenshh·
Today we share our Alibaba Cloud research for the first time, where we gained unauthorized access to other customers' databases in two different services 🚨 This complex research involved RCE, PE, Container escape, K8s lateral movement, and supply chain attack. Check it out 🧵
Ronen Shustin tweet media
English
13
398
1.3K
195.2K
Pawel Rzepa retweetledi
spaceraccoon | Eugene Lim
spaceraccoon | Eugene Lim@spaceraccoon·
This is an excellent writeup by Sylwia Budzynska on the fundamentals of static analysis, especially the practical graph theory background of the tools. It's important to understand how they work! github.blog/2023-03-31-cod…
English
4
36
150
18.5K
Pawel Rzepa retweetledi
Hillai Ben-Sasson
Hillai Ben-Sasson@hillai·
I hacked into a @Bing CMS that allowed me to alter search results and take over millions of @Office365 accounts. How did I do it? Well, it all started with a simple click in @Azure… 👀 This is the story of #BingBang 🧵⬇️
Hillai Ben-Sasson tweet media
English
254
3.2K
14.7K
3.2M
Richard Boyd
Richard Boyd@rchrdbyd·
@benbridts @iann0036 @shmick @awscloud same. generate 10 and keep only the ones that start with a leading 0. This way you always know which accounts are "real" just by looking at the ID and you teach your teams to properly string-encode account IDs
English
7
2
43
20.4K
Pawel Rzepa
Pawel Rzepa@Rzepsky·
@Voulnet Well, eventually it doesn't matter if it was basic or sophisticated when it works. For me it's a good real case example of a need to care about layered security and not just about perimeter. I can see too often such misconfigs in the wild. Hopefully it'll be a trigger for changes
English
0
0
0
10
Mohammed Aldoub م.محمد الدوب
@Rzepsky Kudos to them for the write up but I felt it was too basic for a cloud based attack. Pwn app, abuse instance Metadata v1, find juicy cred and use it to find stuff in other plaintext services.
English
1
0
0
47
Pawel Rzepa
Pawel Rzepa@Rzepsky·
Interesting real-life cyber attack with a good kill chain analysis. It uncovers the all-too-common mistakes that lead to data theft, including hardcoded secrets and overlooked least privilege principles. Worth reading article 👇
Sysdig@sysdig

⚔ Sysdig TRT just uncovered a nasty cloud attack. SCARLETEEL began with a compromised container & ended with privilege escalation into an #AWS account to steal proprietary software. Read more on the attack & takeaways to help you stay safe in the cloud: okt.to/drzW5y

English
1
0
4
326
Pawel Rzepa retweetledi
Nick Frichette
Nick Frichette@Frichette_n·
New cloud security research! We found a method to bypass CloudTrail logging for both read AND write API actions in AWS Service Catalog! In addition, we also reported an issue with a lack of CloudTrail logging in AWS Control Tower. securitylabs.datadoghq.com/articles/bypas…
English
3
60
139
33.2K
Marco Lancini
Marco Lancini@lancinimarco·
WOW! 🎉 We just hit 10K active subscribers on @CloudSecList – thanks for being part of our incredible community. If you are not on it yet, you can subscribe at: cloudseclist.com
English
3
2
25
3.1K
Pawel Rzepa retweetledi
Nick Frichette
Nick Frichette@Frichette_n·
My talk "What I Wish I Knew Before Pentesting AWS Environments" for SANS Pen Test Hackfest 2022 is now on YouTube! Check it out if you're interested in learning more ways to attack AWS environments. youtube.com/watch?v=jq8SAF…
YouTube video
YouTube
English
2
30
93
6.5K
Pawel Rzepa retweetledi
Ben Bridts‏
Ben Bridts‏@benbridts·
Found a cool CloudFormation StackSet feature that didn't get an announcement blogpost (yet?): At this point it still seems very limited, but hopefully it will get more features over time docs.aws.amazon.com/AWSCloudFormat…
Ben Bridts‏ tweet media
English
1
6
26
6.4K
Pawel Rzepa retweetledi
Rami McCarthy
Rami McCarthy@ramimacisabird·
📜 Trying to get better at putting out rougher work! To that end, I'm starting to externalize some of my internal knowledge hub - starting with an enumeration of Lambda risks. Let me know what I'm missing! ramimac.github.io/wiki/lambda-ri…
English
1
11
32
4.2K
Pawel Rzepa retweetledi