0x55aa
Subscribe
Sign in
Home
Archive
About
EC2 IAM role STS credentials compromise via IMDS
Exploring how temporary credentials obtained through AWS Instance Metadata Service can be extracted and used both inside and outside EC2 instances, and analyzing their visibility in CloudTrail logs.
READ THE LATEST
Recent posts
View all
Revisiting ShellBags in Windows 11
Does Windows 11 treat ShellBags differently?
Feb 15, 2025
•
Ilya Kobzar
1
LevelDB WAL log - extracting ChatGPT conversations
Write-ahead log analysis
Jan 31, 2025
•
Ilya Kobzar
4
3
Diving into Master Boot Record
Parsing the sector 0
Jan 26, 2025
•
Ilya Kobzar
1
Behavioral analysis of user file operations with SRUM
Unveiling forensic insights and pitfalls of SRUM data
Jan 16, 2025
•
Ilya Kobzar
2
See all
0x55aa
Computer forensics and malware analysis blog.
Subscribe
Links
LinkedIn
GitHub
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts