- Популярные видео
- Авто
- Видео-блоги
- ДТП, аварии
- Для маленьких
- Еда, напитки
- Животные
- Закон и право
- Знаменитости
- Игры
- Искусство
- Комедии
- Красота, мода
- Кулинария, рецепты
- Люди
- Мото
- Музыка
- Мультфильмы
- Наука, технологии
- Новости
- Образование
- Политика
- Праздники
- Приколы
- Природа
- Происшествия
- Путешествия
- Развлечения
- Ржач
- Семья
- Сериалы
- Спорт
- Стиль жизни
- ТВ передачи
- Танцы
- Технологии
- Товары
- Ужасы
- Фильмы
- Шоу-бизнес
- Юмор
AWS Hacking Tactics EXPOSED — FOXXCON Meetup | July 2025
*What does a real-world AWS breach actually look like from the inside?*
At *FOXXCON July 2025,* Redfox Security’s Principal Consultant *Shashi Prasad* delivers a no-fluff, hands-on walkthrough into the world of *cloud pentesting and AWS exploitation* — where a single misconfigured *IAM policy or exposed access key can lead to total compromise.*
This isn't a theoretical talk — it's a field-tested breakdown of how real attackers exploit common AWS weaknesses during real-world engagements.
*In this session, you’ll learn:*
- Why *IAM misconfigurations* are the #1 AWS security risk
- The *truth about black-box vs. white-box cloud assessments*
- How *attackers leverage read-only credentials to escalate access*
- The *difference between long-term and short-term key abuse*
- How to *spot and exploit flawed IAM policies*
- Actual *commands, enumeration paths, and techniques used*
- Why *SSM Parameter Store secrets aren’t as secure as they seem*
- How *roles, policies, and ARNs can be abused in poorly secured environments*
*This session is a must-watch for:*
- Red teamers
- Cloud security engineers
- Pentesters
- Anyone serious about securing their AWS infrastructure
*Want to start or grow your cybersecurity career?*
*Check out our expert-led courses:* https://academy.redfoxsec.com
*Join the Redfox Security community:* https://linktr.ee/redfoxsec
*Powered by Redfox Cyber Security Pvt. Ltd.*
*Important Note:*
This video is for educational purposes only. It demonstrates ethical hacking techniques in authorized, controlled environments. Using these methods without documented consent is prohibited and unethical.
*Disclaimer:*
Redfox Security is not responsible for any misuse or unauthorized actions by viewers.
*Who Are We?*
Redfox Security is a global penetration testing firm with over ten years of cybersecurity experience. We help businesses, from startups to large corporations, protect against threats. Our expert team provides top-tier security consulting services across four countries, dedicated to ensuring your business grows securely.
Like, share, and subscribe for more real-world cybersecurity content.
Turn on notifications so you never miss an upload.
*Website:* https://redfoxsec.com
*LinkedIn:* https://www.linkedin.com/company/redfoxsec
*Facebook:* https://www.facebook.com/redfoxsec
*Instagram:* https://www.instagram.com/redfoxcybersecurity
*Twitter:* https://x.com/redfoxsec
#redfox #redfoxacademy #redfoxsecurity #aws #cybersecurity #cybersecurity2025 #cybersecurityawareness #awshacking #cloudsecurity #hacking #foxxcon #securityawareness #pentesting #shashi #shashiprasad
Видео AWS Hacking Tactics EXPOSED — FOXXCON Meetup | July 2025 канала Redfox Security
At *FOXXCON July 2025,* Redfox Security’s Principal Consultant *Shashi Prasad* delivers a no-fluff, hands-on walkthrough into the world of *cloud pentesting and AWS exploitation* — where a single misconfigured *IAM policy or exposed access key can lead to total compromise.*
This isn't a theoretical talk — it's a field-tested breakdown of how real attackers exploit common AWS weaknesses during real-world engagements.
*In this session, you’ll learn:*
- Why *IAM misconfigurations* are the #1 AWS security risk
- The *truth about black-box vs. white-box cloud assessments*
- How *attackers leverage read-only credentials to escalate access*
- The *difference between long-term and short-term key abuse*
- How to *spot and exploit flawed IAM policies*
- Actual *commands, enumeration paths, and techniques used*
- Why *SSM Parameter Store secrets aren’t as secure as they seem*
- How *roles, policies, and ARNs can be abused in poorly secured environments*
*This session is a must-watch for:*
- Red teamers
- Cloud security engineers
- Pentesters
- Anyone serious about securing their AWS infrastructure
*Want to start or grow your cybersecurity career?*
*Check out our expert-led courses:* https://academy.redfoxsec.com
*Join the Redfox Security community:* https://linktr.ee/redfoxsec
*Powered by Redfox Cyber Security Pvt. Ltd.*
*Important Note:*
This video is for educational purposes only. It demonstrates ethical hacking techniques in authorized, controlled environments. Using these methods without documented consent is prohibited and unethical.
*Disclaimer:*
Redfox Security is not responsible for any misuse or unauthorized actions by viewers.
*Who Are We?*
Redfox Security is a global penetration testing firm with over ten years of cybersecurity experience. We help businesses, from startups to large corporations, protect against threats. Our expert team provides top-tier security consulting services across four countries, dedicated to ensuring your business grows securely.
Like, share, and subscribe for more real-world cybersecurity content.
Turn on notifications so you never miss an upload.
*Website:* https://redfoxsec.com
*LinkedIn:* https://www.linkedin.com/company/redfoxsec
*Facebook:* https://www.facebook.com/redfoxsec
*Instagram:* https://www.instagram.com/redfoxcybersecurity
*Twitter:* https://x.com/redfoxsec
#redfox #redfoxacademy #redfoxsecurity #aws #cybersecurity #cybersecurity2025 #cybersecurityawareness #awshacking #cloudsecurity #hacking #foxxcon #securityawareness #pentesting #shashi #shashiprasad
Видео AWS Hacking Tactics EXPOSED — FOXXCON Meetup | July 2025 канала Redfox Security
AWS Hacking FOXXCON Meetup FOXXCON AWS Penetration Testing AWS Security Cloud Pentesting AWS CLI Enumeration AWS Red Teaming AWS Credential Extraction Cloud Security Assessment White Box Pentest AWS SSM Parameter Store Exploit AWS Vulnerabilities AWS Security Misconfigurations AWS Pentest Methodology Real World AWS Hacking Shashi Prasad AWS PetroSecurity AWS Talk AWS Short Term Access Keys Cloud Infrastructure Security Red Team Cloud Assessment
Комментарии отсутствуют
Информация о видео
12 июля 2025 г. 17:44:21
00:50:58
Другие видео канала















![The Dangers of Hard Coded Credentials [Android Pentesting]](https://i.ytimg.com/vi/zYT7OpIxT_4/default.jpg)




