Hacking the Cloud's Avatar

Hacking the Cloud

@hackingthe.cloud

An open source encyclopedia of offensive security techniques that can be used in cloud environments. Created and maintained by @frichetten.com

574
Followers
1
Following
105
Posts
21.10.2024
Joined
Posts Following

Latest posts by Hacking the Cloud @hackingthe.cloud

Preview
Unauthenticated Enumeration of Azure Active Directory Email Addresses - Hacking The Cloud Discover how to exploit information disclosure configurations in Azure Active Directory to enumerate valid email addresses.

Got a list of potential corporate emails? You can verify which ones are valid Azure AD accounts without authentication using tools like CredMaster or Quiet Riot. Useful for password spraying or even pivoting to AWS root user testing.

04.03.2026 15:02 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Abusing Overpermissioned AWS Cognito Identity Pools - Hacking The Cloud How to take advantage of misconfigured Amazon Cognito Identity Pools.

What if an attacker could turn a simple Cognito login into full AWS account access? Misconfigured Identity Pools can grant excessive IAM permissions to anyone who authenticates, even anonymous users. Learn how this exploitation chain works.

26.02.2026 15:03 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Introduction to User Data - Hacking The Cloud An introduction to EC2 User Data and how to access it.

EC2 user data scripts often contain hardcoded credentials, despite AWS explicitly warning against it. If you gain access to an instance, check 169.254.169.254/latest/user-... immediately.

24.02.2026 15:04 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Create a Console Session from IAM Credentials - Hacking The Cloud How to use IAM credentials to create an AWS Console session.

Got IAM creds but tired of wrestling with CLI flags? You can spawn an AWS Console session using aws-vault. Temporary creds work directly, long-term creds need sts:GetFederationToken first. Heads up: this is noisy in CloudTrail.

18.02.2026 15:03 πŸ‘ 1 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Preview
GCP Cloud Workstations Privilege Escalation - Hacking The Cloud Break out of a Cloud Workstations container through an exposed Docker socket, then access project credentials from instance metadata.

ICYMI: A look at how a familiar container escape pattern shows up in GCP Cloud Workstations. We trace a path from a container to service account.

If you’re using Cloud Workstations, this is a useful model to keep in mind.

16.02.2026 15:03 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Get IAM Credentials from a Console Session - Hacking The Cloud Convert access to the AWS Console into IAM credentials.

Got browser cookies but no AWS credentials? CloudShell has an undocumented metadata endpoint on port 1338 that exposes IAM creds. Load the session cookies, hit the endpoint, and you've got temporary credentials for your tools.

12.02.2026 15:02 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Loot Public EBS Snapshots - Hacking The Cloud How to find and take advantage of exposed EBS snapshots.

Tens of thousands of EBS snapshots are publicly exposed right now. Unlike most AWS resources, you can list all public snapshots via the API and filter by account ID. Easy recon, zero detection risk.

10.02.2026 15:05 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Brute Force IAM Permissions - Hacking The Cloud Brute force the IAM permissions of a user or role to see what you have access to.

How do you know what permissions compromised AWS credentials actually have? Brute force them. enumerate-iam tests safe API calls to map your access. Just note: this is loud and will light up CloudTrail.

04.02.2026 15:02 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Call for research: AI and LLM security - Hacking The Cloud Hacking the Cloud is opening the door to AI and LLM security research.

ICYMI: AI workloads are landing in the same cloud accounts we’ve been breaking into (and defending) for years. It's time for Hacking the Cloud to catch up. We're announcing a call for research! Share your AI and LLM sec research with thousands of readers.

02.02.2026 15:02 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Hunting GCP Buckets - Hacking The Cloud How to find valid and invalid GCP Buckets using tools

GCP buckets and AWS S3 buckets are nearly identical under the hood. CloudStorageFinder works for both with minimal changes - just swap the endpoint URL. Here's how to hunt for GCP buckets.

29.01.2026 15:05 πŸ‘ 2 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Preview
AWS Network Firewall Egress Filtering Bypass - Hacking The Cloud Bypass AWS Network Firewall Egress Filtering using SNI spoofing and Host Header manipulation.

AWS Network Firewall checks SNI and Host headers but never verifies the actual destination IP. Attackers can bypass egress filtering by spoofing legitimate domains while routing traffic to malicious IPs.

27.01.2026 15:03 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Break LLM Workflows with Claude's Refusal Magic String - Hacking The Cloud How Anthropic's refusal test string can be abused to stop streaming responses and create sticky failures.

In case you missed it, did you know Claude models have a "magic string" to test when a model refuses to respond? If that string enters prompt context, it can be abused to break LLM workflows until context is reset.

It's the EICAR test string of the AI age. Details:

26.01.2026 15:01 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Preview
Exploiting Misconfigured GitLab OIDC AWS IAM Roles - Hacking The Cloud Discover how to identify and exploit misconfigured AWS IAM roles using GitLab OIDC, with a detailed, step-by-step guide.

Misconfigured GitLab OIDC with AWS IAM roles can lead to unauthorized role assumption. Learn to identify and exploit such vulnerabilities with a step-by-step guide. Stay informed to protect your cloud infrastructure from unauthorized access.

21.01.2026 15:05 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Unauthenticated Enumeration of IAM Users and Roles - Hacking The Cloud Discover how to exploit cross-account behaviors to enumerate IAM users and roles in another AWS account without authentication.

Discover how to enumerate IAM users and roles in AWS without prior access! Through clever techniques like exploiting resource-based policies, you can explore insights across AWS accounts. Harness tools like Quiet Riot for efficient execution. Dive deeper here:

15.01.2026 15:03 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Abusing Misconfigured Role Trust Policies with a Wildcard Principal - Hacking The Cloud How to take advantage of misconfigured role trust policies that have wildcard principals.

Exploring the impact of misconfigured AWS IAM role trust policies. Learn how wildcard Principals in trust policies can open up roles to any AWS account, posing serious security risks. Are your policies airtight? Dive deeper into this cloud security issue with us!

13.01.2026 15:02 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Terraform Enterprise: Attack the Metadata Service - Hacking The Cloud Leverage a default configuration in Terraform Enterprise to steal credentials from the Metadata Service

Discover how a default configuration in Terraform Enterprise can expose sensitive credentials via the Metadata Service. By understanding the nuances of remote execution and Docker in Terraform, you can mitigate potential security risks before they affect your cloud infrastructure.

07.01.2026 15:03 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
2025 Hacking the Cloud: Year in Review - Hacking The Cloud An end of year summary for Hacking the Cloud in 2025.

The 2025 Hacking the Cloud: Year in Review is out! We take a look at the growing tide of software supply chain attacks, discuss the most critical cloud vuln discovered to date, and share some stats for the site!

hackingthe.cloud/blog/2025_wr...

05.01.2026 15:17 πŸ‘ 5 πŸ” 2 πŸ’¬ 0 πŸ“Œ 0
Preview
Connection Tracking - Hacking The Cloud Abuse security group connection tracking to maintain persistence even when security group rules are changed.

Discover how AWS connection tracking affects security group rules. Once connections are established, they persist even if rules change. Learn how this impacts security, illustrated with EC2 instances and penetration testing scenarios.

01.01.2026 15:03 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
CI/CDon't - Hacking The Cloud An AWS/GitLab CICD themed CTF.

Dive into "CI/CDon't", an AWS/GitLab-themed CTF where you can test your security chops on vulnerable infrastructure. Deploy it using Terraform and explore fun, low-difficulty CI/CD challenges. Remember, it's in your AWS account, so handle with care! Check it out:

30.12.2025 15:02 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Bypass GuardDuty Tor Client Findings - Hacking The Cloud Connect to the Tor network from an EC2 instance without alerting GuardDuty.

Learn how to bypass AWS GuardDuty's Tor Client detection on EC2 instances without triggering alerts. By leveraging Tor bridges and using obfs4proxy, you can connect discreetly to the Tor network, maintaining privacy while avoiding unauthorized access warnings. More details here:

24.12.2025 15:03 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
IAM Persistence through Eventual Consistency - Hacking The Cloud Abuse IAM's eventual consistency to maintain persistence against incident response containment.

New on @hackingthe.cloud, did you know that attackers can prevent you from kicking them out of your environment in certain situations? Eduard Agavriloae shares his research on how attackers can nullify containment attempts!

hackingthe.cloud/aws/post_exp...

18.12.2025 16:25 πŸ‘ 6 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Preview
Steal IAM Credentials and Event Data from Lambda - Hacking The Cloud Leverage file read and SSRF vulnerabilities to steam IAM credentials and event data from Lambda.

Lambda's environment variables hold IAM credentials that attackers can target via file read and SSRF vulnerabilities. They can also extract event data using SSRF exploits. This blog explores practical techniques for exploiting these vulnerabilities in Lambda functions.

18.12.2025 15:04 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Discover secrets in public AMIs - Hacking The Cloud How to find public AMIs and get stored secrets.

Public AMIs can reveal AWS secrets! If you have an account ID, you can use the AWS API to find these AMIs and launch instances to look for sensitive data. Manual and automated scanning can help find credentials, but remember: curiosity must come with a conscience.

16.12.2025 15:04 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
GCP Goat - Hacking The Cloud GCP Goat is the Vulnerable application for learning the GCP Security

Explore Google Cloud Security with GCP-Goat! This tool offers hands-on scenarios for testing vulnerabilities in GCP services like Compute Engine, SQL Instances, and GKE. Enhance your security skills by diving into realistic attack simulations. Check it out!

10.12.2025 15:01 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Anonymous Blob Access - Hacking The Cloud Finding and accessing files stored in Azure Storage Accounts without authentication.

Explore how Azure Storage's anonymous blob access permissions can expose file data without authentication. Learn about the security implications of Container Access permissions and how attackers can exploit them to access files, complete with a practical example and steps.

25.11.2025 15:02 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Unauthenticated Enumeration of Google Workspace Email Addresses - Hacking The Cloud Discover how to exploit information disclosure configurations in Google Workspace to enumerate valid email addresses.

Ever wonder how attackers discover valid Google Workspace emails without authentication? Learn about this technique using Quiet Riot and the potential implications for password spraying attacks and AWS Root User testing. Understanding these tactics is crucial for cloud security.

19.11.2025 15:05 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Security and Constraints - Hacking The Cloud Security considerations and constraints that are unique to GCP

Explore unique GCP security strategies with us! Learn about project hierarchies and how policy constraints can enhance security but remember, most aren't retroactive. Dive into scenarios and constraints that shape your cloud environment securely. More insights here:

13.11.2025 15:04 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Bypass GuardDuty Pentest Findings for the AWS CLI - Hacking The Cloud Prevent Kali Linux, ParrotOS, and Pentoo Linux from throwing GuardDuty alerts by modifying the User Agent string when using the AWS CLI.

ver worried about detection when using AWS CLI from specific Linux distros? Modify the User-Agent string to bypass GuardDuty alerts. Our blog dives into using Burp Suite for this, ensuring you leave no suspicious trails. Take control of what your requests reveal. Read more: buff.ly/ycJiEvz

11.11.2025 15:04 πŸ‘ 1 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Preview
Lambda Persistence - Hacking The Cloud How to establish persistence on a Lambda function after getting remote code execution.

Exploring Lambda persistence? Our latest blog reveals how to establish persistence on AWS Lambda after gaining remote code execution using Python and Ruby runtimes as examples. Learn how to backdoor runtime files effectively while keeping things "warm." Check it out here:

05.11.2025 15:03 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Survive Access Key Deletion with sts:GetFederationToken - Hacking The Cloud Use sts:GetFederationToken to maintain access, even if the original IAM credentials are revoked.

Deleting compromised AWS IAM keys might not be enough! Attackers can use `sts:GetFederationToken` to create temporary access credentials. Explore this technique and learn defensive measures like monitoring and using a "DenyAll" policy. Stay one step ahead. Read more:

30.10.2025 14:05 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0