MaGe Linux Operations
Aug 4, 2023 · Information Security
How to Detect and Exploit Cloud Access Key (AK/SK) Leaks
This article explains why cloud platforms rely on access keys, describes common scenarios where AK/SK credentials are exposed, provides practical examples such as heapdump and JavaScript leaks, and shows how attackers can hijack storage buckets or execute commands on compromised cloud hosts.
AK/SKaccess key leakagecloud security
0 likes · 7 min read
