Data leaks from AWS EC2 — how can Bob reveal Alice’s secrets?

In this blog post I’m going to show you several ways in which sensitive data from an isolated AWS EC2 instance can be exfiltrated by an attacker who compromised access keys, or by an excessively “curious” teammate

Paweł Rzepa 2019.07.30   –   8 min read

In this blog post I’m going to show you several ways in which sensitive data from an isolated AWS EC2 instance can be exfiltrated by an attacker who compromised access keys, or by an excessively “curious” teammate

Paweł Rzepa Senior IT Security Consultant