-
Elastic Compute Cloud
- EC2 User Data Leakage
- Unauthorized Access To Open Ports
- Exposed Public EBS Snapshots
- RCE via SSM
- Exfiltrating Data via Amazon Provided DNS
-
Lambda
- Lambda Alias Routing
- Maintaining Access via Lambda Backdoor
- Abusing Functions Execution Flows
- Injecting Malicious Runtime
- Exfiltrating Lambda Event Data
- Application Security Vulnerabilities
-
Identity & Access Management (IAM)
- Misconfigured Trust Policy
- Pass Role
- Over Permissive Permission Policy
- Dangerous Policy Combination
- Cross Account Role
-
API Gateway
- Denial of Service
- Poor Authorizer Function
- WAF Bypass
- Misconfigured Private API Gateway
- Lack of Authentication on Endpoints