Rhino Security Labs

Strategic Blog

S3 Ransomware Part 2: Prevention and Defense

Spencer Gietzen
June 11, 2019

This is part two in a two-part series on S3 Ransomware. Part One discusses the attack vector of S3 Ransomware and demonstrates a proof of concept.
Note: This post not only discusses defense mechanisms against S3 ransomware, but it also…

Google Cloud Platform (GCP)
Bucket Enumeration and Privilege Escalation

Bypassing Email Security Controls (P1: URL Scanning)

Unauthenticated AWS Role Enumeration (IAM Revisited)

Spencer Gietzen

When attacking an AWS cloud environment, its important to use leverage unauthenticated enumeration whenever possible. This kind of IAM recon can help you gain a better understanding of the environment itself, the users and applications that…