#flawscloud
Read more stories on Hashnode
Articles with this tag
This project demonstrates the deployment of the ELK Stack on an AWS EC2 instance and the ingestion of Flaws.cloud CloudTrail logs into the ELK Stack...
For Level 3, the container’s webserver can be accessed with http://container.target.flaws2.cloud/proxy/http://flaws.cloud...
As stated in the Instruction, this level is operating within a container, resembling the setup of a website hosted on an S3 bucket along with other...
First, see how to identify IPs and sub-domains associated with flaws2.cloud using nslookup Several IP addresses were identified. Now using nslookup...
🚀 Sign up for the challenge Here by Cyber-defender for Free AIM This lab aims to analyze the CloudTrail logs for AWS security incidents related to...
In this final challenge, we are provided with a user access key that has the Security Audit policy attached to it. We are tasked with exploring the...