Source |
Malwarebytes Labs |
Identifiant |
1326163 |
Date de publication |
2019-09-13 20:44:52 (vue: 2019-09-13 23:08:23) |
Titre |
Hacking with AWS: incorporating leaky buckets into your OSINT workflow |
Texte |
When penetration testing for an organization, what OSINT tactics can researchers employ? We discuss how hacking with AWS buckets can provide more recon data and uncover any leaks.
Categories:
Researcher's corner
Tags: amazonawsAWS bucketsdatahackingIntelintelligence gatheringopen source intelligenceOSINTpen-testingpenetration testingreconreconnaisancevulnerabilities
(Read more...)
|
Envoyé |
Oui |
Condensat |
amazonawsaws any appeared aws aws: buckets bucketsdatahackingintelintelligence can categories: corner data discuss employ first gatheringopen hacking how incorporating intelligenceosintpen labs leaks leaky malwarebytes more organization osint penetration post provide read recon researcher researchers source tactics tags: testing testingpenetration testingreconreconnaisancevulnerabilities uncover what when workflow your |
Tags |
|
Stories |
|
Notes |
|
Move |
|