Pwned Labs Blog
The latest techniques in hacking and defending
- Rob Alport
- May 20, 2025
From building military-grade networks to cloud security guardrails, Tyler's journey into cybersecurity has been...
- Rob Alport
- April 25, 2025
We sat down with Filip Jodoin, Penetration Tester and Pwned Labs instructor, to find out more about his cybersecurity...
- Goodness Adediran
- March 11, 2025
Disclaimer: The information in this blog post is provided for educational and informational purposes only. We do not...
- Tyler Petty
- March 6, 2025
Cloud Security Researcher and Advocate, Seth Art, recently published the blog post whoAMI: A cloud image name confusion...
- Marios Pappas
- December 10, 2024
Join us in this new blog post as we explore the various methods that threat actors commonly use to move laterally and...
- Tyler Petty
- November 16, 2024
AWS recently introduced Resource Control Policies (RCPs), powerful guardrails designed to enhance your organization’s...
- Marios Pappas
- October 22, 2024
Join us in this blog post as we explore various methods that threat actors commonly use to gain initial access to Azure.
- Ayush Singh
- June 20, 2024
In this blog post, we will explore how to exploit Cloud Build to escalate privileges and achieve lateral movement in a...
- Yasir Gilani
- June 10, 2024
This is the second in a series of walkthroughs for the Thunderdome multi-cloud Cyber Range from Pwned Labs. This post...
- Yasir Gilani
- May 20, 2024
This is the first in a series of walkthroughs for the Thunderdome multi-cloud Cyber Range from Pwned Labs. This post...
- Goodness Adediran
- May 2, 2024
Join us as we get started with using Pacu - an AWS exploitation framework created by Rhino Security Labs that is...
- Ian Austin
- March 22, 2024
Azure SQL Managed Instance (and also Azure SQL Server) suffer from insufficient validation of the LOCATION parameter of...
- Tyler Petty
- March 14, 2024
Join us on a ride-along pentest of AWS and GitLab! Huge Logistics has hired us to perform a security assessment of...
- Edrian Miranda Muñoz
- March 4, 2024
Join us as we dive into Azure Virtual Machine (VM) security from a red team perspective, focusing on identifying and...
Your security training ground
Experience, real-world, byte-sized cloud security labs for training cyber warriors. From beginners to pros, our engaging platform allows you to secure your defenses, ignite your career and stay ahead of threats.