Pwned Labs Blog


The latest techniques in hacking and defending

Meet your ACRTP Bootcamp instructor: Tyler Petty

From building military-grade networks to cloud security guardrails, Tyler's journey into cybersecurity has been...

RansomWhen: The Hidden Risks of AWS KMS in Ransomware Attacks

Disclaimer: The information in this blog post is provided for educational and informational purposes only. We do not...

Defending Against the whoAMI Attack with AWS Declarative Policies

Cloud Security Researcher and Advocate, Seth Art, recently published the blog post whoAMI: A cloud image name confusion...

Building Security Guardrails with AWS Resource Control Policies

AWS recently introduced Resource Control Policies (RCPs), powerful guardrails designed to enhance your organization’s...

Thunderdome - Pulled From the Sky walkthrough

This is the second in a series of walkthroughs for the Thunderdome multi-cloud Cyber Range from Pwned Labs. This post...

Thunderdome - Emerge Through the Breach walkthrough

This is the first in a series of walkthroughs for the Thunderdome multi-cloud Cyber Range from Pwned Labs. This post...

Beginner's Guide to hunting for AWS IAM Privilege Escalations with Pacu

Join us as we get started with using Pacu - an AWS exploitation framework created by Rhino Security Labs that is...

Abusing Identity Providers in AWS

Join us on a ride-along pentest of AWS and GitLab! Huge Logistics has hired us to perform a security assessment of...

Your security training ground


Experience, real-world, byte-sized cloud security labs for training cyber warriors. From beginners to pros, our engaging platform allows you to secure your defenses, ignite your career and stay ahead of threats.