Rhino Security Labs

Strategic Blog

Cloud Breach: Compromising AWS IAM Credentials

Spencer Gietzen
October 29, 2018

With Pacu and our AWS Pentesting simulating attacks on cloud architecture, we often get questions about how keys get lost (or even statements that such an event is unlikely). To address these concerns we’ve written a blog post to walk…

Pacu: The Open Source AWS Exploitation Framework

AWS Privilege Escalation – Methods and Mitigation

GDRP and Penetration Testing: What You Need to Know

Benjamin Caudill

The time of GDPR is upon us, and unless you live under a rock you’ve already received a handful of emails about privacy policy changes.  Our goal here is to help you understand what it is, and more specifically, how GDPR relates to…