Rhino Security Labs

Strategic Blog

Google Cloud Platform (GCP)
Bucket Enumeration and Privilege Escalation

Spencer Gietzen

For those unfamiliar, GCP is a cloud platform that offers a variety of cloud-computing solutions for businesses of any size to take advantage of. Most people would put it up in the “big 3” cloud providers that are available,…

Bypassing Email Security Controls (P1: URL Scanning)

Unauthenticated AWS Role Enumeration (IAM Revisited)

AWS IAM Privilege Escalation – Methods and Mitigation

Spencer Gietzen

At Rhino Security Labs, we do a lot of penetration testing for AWS architecture, and invest heavily in related AWS security research.  This post will cover our recent findings in new IAM Privilege Escalation methods – 21 in total –…