Pwned Labs Blog
The latest techniques in hacking and defending
- Marios Pappas
- December 10, 2024
Join us in this new blog post as we explore the various methods that threat actors commonly use to move laterally and...
- Marios Pappas
- October 22, 2024
Join us in this blog post as we explore various methods that threat actors commonly use to gain initial access to Azure.
- Ayush Singh
- June 20, 2024
In this blog post, we will explore how to exploit Cloud Build to escalate privileges and achieve lateral movement in a...
- Yasir Gilani
- June 10, 2024
This is the second in a series of walkthroughs for the Thunderdome multi-cloud Cyber Range from Pwned Labs. This post...
- Yasir Gilani
- May 20, 2024
This is the first in a series of walkthroughs for the Thunderdome multi-cloud Cyber Range from Pwned Labs. This post...
- Ian Austin
- March 22, 2024
Azure SQL Managed Instance (and also Azure SQL Server) suffer from insufficient validation of the LOCATION parameter of...
- Tyler Petty
- March 14, 2024
Join us on a ride-along pentest of AWS and GitLab! Huge Logistics has hired us to perform a security assessment of...
- Edrian Miranda Muñoz
- March 4, 2024
Join us as we dive into Azure Virtual Machine (VM) security from a red team perspective, focusing on identifying and...
Your security training ground
Experience, real-world, byte-sized cloud security labs for training cyber warriors. From beginners to pros, our engaging platform allows you to secure your defenses, ignite your career and stay ahead of threats.