Written by 妖怪November 28, 2020 Exploiting fine-grained AWS IAM permissions for total cloud compromise: a real world example (Part 1/2) : https://t.co/Tp0zmZpQie Part 2 : https://t.co/d6Fbt1uDXthttps://t.co/d6Fbt1uDXt credits @securfreakazoid Share this: Share on X (Opens in new window) X Share on Facebook (Opens in new window) Facebook Like this:Like Loading...