AWS S3 Bucket Misconfiguration
Identify and exploit insecure S3 bucket configurations
Intermediate
IAM Privilege Escalation Analysis
Analyze IAM policies for privilege escalation vulnerabilities
Advanced
EKS Container Security Assessment
Analyze Kubernetes container security misconfigurations
Advanced
Azure AD Privilege Analysis
Identify Azure AD privilege escalation vectors
Intermediate