Join us in this new blog post as we explore the various methods that threat actors commonly use to m...
Pwned Labs Blog
The latest techniques in hacking and defending
AWS recently introduced Resource Control Policies (RCPs), powerful guardrails designed to enhance yo...
Join us in this blog post as we explore various methods that threat actors commonly use to gain init...
In this blog post, we will explore how to exploit Cloud Build to escalate privileges and achieve lat...
This is the second in a series of walkthroughs for the Thunderdome multi-cloud Cyber Range from Pwne...
Many people want to know "how do I get started with AWS security?", and this blog post is for them. ...
This is the first in a series of walkthroughs for the Thunderdome multi-cloud Cyber Range from Pwned...
Join us as we get started with using Pacu - an AWS exploitation framework created by Rhino Security ...
Azure SQL Managed Instance (and also Azure SQL Server) suffer from insufficient validation of the LO...
Join us on a ride-along pentest of AWS and GitLab! Huge Logistics has hired us to perform a security...
Join us as we dive into Azure Virtual Machine (VM) security from a red team perspective, focusing on...
Your security training ground
Experience, real-world, byte-sized cloud security labs for training cyber warriors. From beginners to pros, our engaging platform allows you to secure your defenses, ignite your career and stay ahead of threats.