Hacking4

Check out the latest posts

How to hack GCP compute instances

Introduction Google Cloud offers a secure and efficient way to manage permissions and authentication through service accounts. These accounts are typically associated with GCP resources like Compute Engine instances, allowing them to securely access other Google Cloud services. But how can we abuse the service account credentials and use them...

How to Hack EC2 Instances in AWS Using IMDSv2

Introduction Imagine you're sitting in a room full of cloud architects and penetration testers, discussing the latest advancements in cloud security. The topic of the day is AWS's transition from Instance Metadata Service version 1 (IMDSv1) to version 2 (IMDSv2). A lot of people in the...

How to Hack a Database in Under Five Minutes and How to Secure it

Initially, I intended to write an article about the new RDS brute force protection. And researching the two new RDS GuardDuty findings CredentialAccess:RDS/ AnomalousBehavior.SuccessfulLogin and CredentialAccess:RDS/ AnomalousBehavior.FailedLogin. But even after hours of trial and error, I could not trigger the GuardDuty finding. This article is for...

You’ve successfully subscribed to Alexander Hose
Welcome back! You’ve successfully signed in.
Great! You’ve successfully signed up.
Success! Your email is updated.
Your link has expired
Success! Check your email for magic link to sign-in.