12/29/24

Cloud Automation Black Hat Hacking (how they cover their tracks pt 1)

Demonstrates how black hat hackers are using cloud services to automate everything from infrastructure, to attack servers using cloud services, while staying mostly anonymous.

Previous

Cloud Automation Black Hat Hacking (how they cover their tracks pt2)

Next

CTF walkthrough example (TRYHACKME.COM/BOUNTYHACKER)