Attacking AWS Developers: Stealing Creds from AWS Toolkit

This post reveals how an attacker can leverage a developer's workstation to compromise their AWS credentials and gain access to an ec2 instance.…

Post-Ex: Stealing AWS Credentials

The first of two AWS credential posts, we discuss how to find and use AWS credentials during post-exploitation.…