Discover AWS Organization ID via S3 Bucket using Conditional
Logic
A hands-on demonstration of exploiting IAM policy condition
misconfigurations (aws:ResourceOrgID) to discover AWS
Organization IDs through conditional brute-force techniques on
vulnerable S3 buckets.
Published: April 12, 2025
15 min read
IAM Policy Exploitation
AWS Security
S3 Security
Organization ID Enumeration
Security Fundamentals
In Progress
Introduction to Network Security on Cloud {Azure}
A comprehensive guide covering the basics of network security,
common threats, and defensive strategies for beginners.
Expected: Till further notice
???
Firewalls
IDS/IPS
VPN
Understanding OWASP Top 10
Deep dive into the OWASP Top 10 web application security risks
with practical examples and mitigation strategies.
Expected: Till further notice
???
SQL Injection
XSS
CSRF
AWS Security Best Practices
Essential security practices for AWS cloud environments,
including IAM, S3, and network security configurations.
Expected: Till further notice
???
IAM
S3 Security
CloudTrail
Penetration Testing
Research
Building a Home Penetration Testing Lab
Step-by-step guide to setting up a comprehensive penetration
testing lab using VirtualBox and various Linux distributions.
Expected: Till further notice
???
VirtualBox
Kali Linux
Metasploitable
Breaking into Cybersecurity at 18
My personal journey and advice for young professionals looking
to start their cybersecurity career.
Expected: Till further notice
???
Career Tips
Certifications
Networking