Hacking with AWS: incorporating leaky buckets into your OSINT workflow
When penetration testing for an organization, what OSINT tactics can researchers employ? We discuss how hacking with AWS buckets can provide more recon data and uncover any leaks.