What we will do in this article

2: conduct server-side request forgery (SSRF)

What is server-side request forgery (SSRF)?

SSRF flaws occur whenever a web application is fetching a remote resource without validating the user-supplied URL. …

What is Pupy?

MITRE ATT&CK

  • initial access
  • execution
  • persistence
  • privillege escalation
  • defense evasion
  • credential access
  • discovery
  • lateral movement
  • collection
  • command & control

overview

you’ll practice extracting anomalous events with Kinesis Data Analytics. When you’re finished with this lab, you’ll have a streaming pipeline capable of detecting anomalous events in real-time and send them to an S3 bucket.

Amazon Kinesis Data Streams Fundamentals

  • Data streaming technology enables a customer to ingest, process and analyze high volumes of high velocity…

Takahiro Oda

Security Analyst(Full-time), Cloud security engineer(internship). https://www.linkedin.com/in/takahiro-oda-881423197/

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store