AWS GuardDuty | Demo- IAM Role Credential Exfiltration | Workflow with remediation | @Cloud4DevOps

Поделиться
HTML-код
  • Опубликовано: 9 сен 2024
  • Video will help us to understand how you get finding into your AWS GuardDuty console if your IAM Role temp Credentials is compromised. Below pointers covered:-
    - An attacker compromises an EC2 instance and exfiltrates the IAM role credentials via the metadata service.
    - The attacker sets up a CLI user to make API calls.
    CloudShell:- • AWS:- Explore CloudShe...
    CloudShell Find Public IP :- techcommunity....
    AWSConfigRemediation-DeleteIAMRole
    docs.aws.amazo...
    AWSConfigRemediation-DeleteIAMUser
    docs.aws.amazo...
    Lab:-
    aws.amazon.com...
    If you like the video please like, comment, share and subscribe to the channel to get more updates on technical videos.
    Channel Link:- www.youtube.co...
    Join Me on the LinkedIn Group for More updates:- / 13859292
    Happy Learning !!!

Комментарии • 1

  • @rahulove30
    @rahulove30 4 месяца назад

    Sir ji
    Kaha kya ho Raha hai samajh nhi Raha
    Just you have to explain what are you doing
    You are doing great
    But please explain step by step
    You directly go on instance then Direct open Guardduty there is already some data fetch
    So as learner I need step wise sir ji
    This my own comments.
    You are great sir ji