Summary
Personal pentesting engagement writeup.
Enumeration
- Cloud asset discovery
- Web app fuzzing
Foothold
Gained access via misconfigured API.
Privilege Escalation
Escalated using container breakout.
Post-Exploitation
Extracted sensitive data and maintained persistence.