
In this course, you will:
-
Exploit serverless (e.g. Lambda, Azure Functions) applications for initial access into targets.
-
Pivot between data and control planes to expand access (e.g. secrets, snapshots)
-
Evade and disrupt cloud logging platforms (e.g. CloudTrail) to remain undetected.
-
Breach and backdoor boundaries (e.g. VPCs) to access hard to reach systems.
-
Expanding access within Kubernetes (K8s) envs (e.g. GCP bypass of metadata protections)