Attacks against AWS infrastructure
Attack types
ECS Task Definition exploit
In their blog post, Rhino Security Labs describe how to weaponize ECS task definitions to steal access keys and other information: https://rhinosecuritylabs.com/aws/weaponizing-ecs-task-definitions-steal-credentials-running-containers/
Last updated