Username enumeration vulnerabilities can allow attackers to identify valid users, which is the first step in many attacks. During a recent pentest, we discovered two username enumeration vulnerabilities in the AWS Web Console. These…
CloudGoat is Rhino Security Labs’s tool for deploying “vulnerable by design” AWS infrastructure. This blog post will walk through one of the newest CloudGoat scenarios, sqs_flag_shop. where you will attempt to move through an AWS…