New Exercises
- Exercise 25: Cloud Instance Metadata Service (IMDS) Bypass
- Exercise 24: Privilege Escalation via Misconfigured IAM Roles
- Exercise 23: Cloud API Key Leakage and Exploitation
- Exercise 22: Cloud-Based Phishing Attack via Fake Cloud Service
- Exercise 21: Exploiting Misconfigured Cloud Storage Lifecycle Policies
- Exercise 20: Exploiting Cloud Service Misuse (Zombie Resources)
- Exercise 19: Cloud Access Logging and Monitoring Exploitation
- Exercise 18: Insecure Cloud Data Backup Management
- Exercise 17: Cloud Function Permissions Exploitation
- Exercise 16: Cloud Network Security Misconfiguration