OSINT against cloud targets
Cloud Open Source Intelligence Gathering
Introduction
This section covers the different OSINT techniques that can be employed to find information about particular AWS services and the tools that can use the information obtained to chain other attacks.
What are we going to cover
This chapter will primarily cover
Tools and techniques for Open Source Intelligence Gathering to find information
Tools for discovering and stealing keys, information and endpoints
Tools for finding public buckets
Last updated