0% found this document useful (0 votes)
11 views1 page

Final Print 1

The document lists various tools and techniques related to cloud security, logging, and scanning, along with their respective scores or ratings. It includes entries for cloud storage, command injection vulnerabilities, and various scanning methods for AWS and Azure. The information appears to be part of a larger assessment or evaluation of security measures in cloud environments.

Uploaded by

aaj.tiss
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views1 page

Final Print 1

The document lists various tools and techniques related to cloud security, logging, and scanning, along with their respective scores or ratings. It includes entries for cloud storage, command injection vulnerabilities, and various scanning methods for AWS and Azure. The information appears to be part of a larger assessment or evaluation of security measures in cloud environments.

Uploaded by

aaj.tiss
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

2.27 AADInternals-azure 3.

68 cloud Insecure Storage


1.72 Access Logs 5.78 Cloud Logging
5.68 Account Discovery-Cloud 5.76 Cloud Mapper-for AWS
1.33 After Action Report 5.48 Cloud Persistence
4.11 AppArmor -metasploit 5.67 Cloud Post Exploitation
5.12 appidsvc 2.51 Cloud Process (Scanning)
5.8 Application Allow List 2.49 Cloud Scanning
5.12 Application Identity service 2.56 Cloud Scanning (Attributing Hosts)
5.8 Applocker 2.59 Cloud Scanning (EyeWitness)
3.45 Argon2 2.52 Cloud Scanning (IP address Enumeration)
1.12 Argous Corporation 2.52 Cloud Scanning (Wget and JQ tools)
4.6 Armitage (Metasploit GUI) 2.61 Cloud Scanning Defense
5.23 arp_scanner 254 Cloud Scanning(Masscan)
1.61 ASEPs 2.57 Cloud Scanning(TLS-Scan)
1.18 AssetMgtAcct 4.84 Cloud Spotligh SSRF and IMDS
4.11 Attack Framework Defense (Preparation) 4.75 Cloud SQL
1.1O3 Augmenting IR 3.7O Cloud Storage Access
3.2O AWS API Gateway 4.22 Code Executing Microsoft Office files
3.73 Azure Scanning 5.7 Code Wrapping
3.19 Azure Smart Lockout 4.38 Command Injection
5.76 AzViz-for azure 1.16 Command Injection (Green Penguin)
3.73 Basic Blob Finder 4.45 Command Injection Defenses
4.29 BeEF 4.44 Command Injection in IoT
1.88 Behavioral Analysis 4.39 Command Injection Vulnerability
1.70 Berkeley Packet Filters 4.43 Command Stacking
2.18 Bind DNS 2.15 Common name (CN)
5.11 Bitsadmin 3.1O Compromised Password List
3.69 Bucket ACL 1.29 Containment
3.78 Bucket Discovery 4.6O Content Security Policy
3.71 Bucket Finder(Tool) 4.25 Conventional Exploit Delivery
2.51 Builtwith 2.72 Copernic Desktop Search
2.15 Certificate Authority 5.41 Create account with meterpreter
5.45 Certificate Authority (CA) 3.8 Credential Stuffing
2.15 Certificate Transparency 4.44 Crestron DGE-100
5.11 Certutil 4.5O Cross Site scripting(XSS)
2.25 CeWL 1.26 crowdstrike and DFIR track sheets
3.73 Cloud - Azure Scanning 1.45 CyberChef
4.92 Cloud - IMDS Credential Exfilteration 3.42 Decoding Unix and Linux Passwords
5.69 Cloud - Priviliedge Escalation 5.6 Defender Check
3.71 Cloud - S3 Scanning 4.97 Defending SSRF and IMDS
3.72 Cloud - Scanning GCB 2.29 DeHashed
3.8O Cloud - Storage Logging 110.00 Deobfuscation attacker code

You might also like