New Exercises
- Exercise 22: Cloud-Based Phishing Attack via Fake Cloud Service
- Exercise 21: Exploiting Misconfigured Cloud Storage Lifecycle Policies
- Exercise 20: Exploiting Cloud Service Misuse (Zombie Resources)
- Exercise 19: Cloud Access Logging and Monitoring Exploitation
- Exercise 18: Insecure Cloud Data Backup Management
- Exercise 17: Cloud Function Permissions Exploitation
- Exercise 16: Cloud Network Security Misconfiguration
- Exercise 15: Exploiting Insecure Serverless Application APIs
- Exercise 14: Exploiting Cloud Resource Misallocation
- Exercise 13: Cloud-Based Credential Stuffing Attack