New Exercises
- Exercise 18: Insecure Cloud Data Backup Management
- Exercise 17: Cloud Function Permissions Exploitation
- Exercise 16: Cloud Network Security Misconfiguration
- Exercise 15: Exploiting Insecure Serverless Application APIs
- Exercise 14: Exploiting Cloud Resource Misallocation
- Exercise 13: Cloud-Based Credential Stuffing Attack
- Exercise 12: Misconfigured Cloud Function Triggers
- Exercise 11: Cloud Storage Data Breach via Improper Access Control
- Exercise 10: Exploiting Cloud Function Logs (CloudWatch)
- Exercise 9: Cloud Database Vulnerability Exploitation