Exploiting fine-grained AWS IAM permissions for total cloud compromise: a real world example

(Part 1/2) :

https://t.co/Tp0zmZpQie

Part 2 : https://t.co/d6Fbt1uDXthttps://t.co/d6Fbt1uDXt credits @securfreakazoid