AWS Identity and Access Management (IAM) is a web service that helps you securely control access to AWS resources. You use IAM to control who is authenticated and authorized to use resources.
IAM features
1-Shared access to your AWS account
2-Granular permissions
3-Secure access to AWS resources for applications that run on Amazon EC2
4-Multi-factor authentication (MFA)
5-Identity federation
Accessing IAM
1-AWS Management Console
2-AWS Command Line Tools
3-AWS SDKs
4-IAM HTTPS API
How IAM works
The IAM infrastructure includes the following elements:
•Terms
•Principal
•Request
•Authentication
•Authorization
•Actions or operations
•Resources
IAM Best Practices
1-Avoid the use of root account unless strictly necessary
2-Use temporary credentials
3-Embrace the least privilege principle and review all IAM permissions periodically
4-Enforce the least privilege principle to be implemented bi-directionally
5-Monitor account activity regularly using IAM Access Analyzer and AWS CloudTrail
6-Use Multi-Factor Authentication (MFA)
7-Enforce strong passwords
• • •
Missing some Tweet in this thread? You can try to
force a refresh
First thing to test for an SQL injection is to try to break the query,with the intention of getting the syntax of how SQL is getting input at the backend.This technique works in UNION/Error based SQL Injections,where we force the backend database to throw an error.
Using this technique,we can somehow determine the backend query structure to efficiently exploit SQL Injection.Query can be broken by throwing various characters as input.
First and easy solution use any bug bounty platform like @Bugcrowd, @Hacker0x01, @yeswehack, @intigriti etc etc because atleast you will get response in a fixed time. But many have there own bug bounty program and not hosted on these platforms.
So first send them a email asking if they are having any bug bounty program,ask each and every details like about their VRT, scope, vulnerabilities they accept. This will help you understand about how much active that rdp is and also what’s in scope.
Start with learning how to use Burpsuite basics, there are many tutorials available on internet which you can refer. Why it is important?because it is important 🤪
Now you can start @PortSwigger Academy. They have a learning path you can follow that or you can follow owasp list
Make a list and start reading the @PortSwigger Vulnerabilities Notes and solve the labs so clear your concepts. Make sure you are making a detailed notes for yourself because there are so much to learn you may forget some things. For notes-making i use @NotionHQ .