{"id":32256,"date":"2024-03-11T06:01:24","date_gmt":"2024-03-11T06:01:24","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=32256"},"modified":"2024-03-11T06:01:25","modified_gmt":"2024-03-11T06:01:25","slug":"cloudgrappler","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/cloudgrappler\/","title":{"rendered":"CloudGrappler &#8211; Elevating Cloud Security In AWS And Azure"},"content":{"rendered":"\n<p>CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known threat actors in popular cloud environments such as AWS and Azure.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Notes<\/strong><a href=\"https:\/\/github.com\/Permiso-io-tools\/CloudGrappler#notes\"><\/a><\/h2>\n\n\n\n<p>To optimize your utilization of CloudGrappler, we recommend using shorter time ranges when querying for results. <\/p>\n\n\n\n<p>This approach enhances efficiency and accelerates the retrieval of information, ensuring a more seamless experience with the tool.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Required Packages<\/strong><\/h2>\n\n\n\n<pre class=\"wp-block-code\"><code>pip3 install -r requirements.txt<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Cloning Cloudgrep Locally<\/strong><a href=\"https:\/\/github.com\/Permiso-io-tools\/CloudGrappler#cloning-cloudgrep-locally\"><\/a><\/h2>\n\n\n\n<p>To clone the cloudgrep repository locally, run the clone.sh file. Alternatively, you can manually clone the repository into the same directory where CloudGrappler was cloned.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>chmod +x clone.sh\r\n.\/clone.sh<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Input<\/strong><a href=\"https:\/\/github.com\/Permiso-io-tools\/CloudGrappler#input\"><\/a><\/h2>\n\n\n\n<p>This tool offers a CLI (Command Line Interface). As such, here we review its use:<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Example 1 &#8211; Running The Tool With Default Queries File<\/strong><a href=\"https:\/\/github.com\/Permiso-io-tools\/CloudGrappler#example-1---running-the-tool-with-default-queries-file\"><\/a><\/h2>\n\n\n\n<p>Define the scanning scope inside data_sources.json file based on your cloud infrastructure configuration. The following example showcases a structured data_sources.json file for both AWS and Azure environments:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Note<\/strong><a href=\"https:\/\/github.com\/Permiso-io-tools\/CloudGrappler#note\"><\/a><\/h3>\n\n\n\n<p>Modifying the source inside the queries.json file to a wildcard character (*) will scan the corresponding query across both AWS and Azure environments.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>{\r\n  \"AWS\": &#91;\r\n    {\r\n      \"bucket\": \"cloudtrail-logs-00000000-ffffff\",\r\n      \"prefix\": &#91;\r\n        \"testTrails\/AWSLogs\/00000000\/CloudTrail\/eu-east-1\/2024\/03\/03\",\r\n        \"testTrails\/AWSLogs\/00000000\/CloudTrail\/us-west-1\/2024\/03\/04\"\r\n      ]\r\n    },\r\n    {\r\n      \"bucket\": \"aws-kosova-us-east-1-00000000\"\r\n    }\r\n\r\n  ],\r\n  \"AZURE\": &#91;\r\n    {\r\n      \"accountname\": \"logs\",\r\n      \"container\": &#91;\r\n        \"cloudgrappler\"\r\n      ]\r\n    }\r\n  ]\r\n}<\/code><\/pre>\n\n\n\n<p>Run command<\/p>\n\n\n\n<p><code>python3 main.py<\/code><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Example 2 &#8211; Permiso Intel Use Case<\/strong><a href=\"https:\/\/github.com\/Permiso-io-tools\/CloudGrappler#example-2---permiso-intel-use-case\"><\/a><\/h2>\n\n\n\n<p><code>python3 main.py -p<\/code><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>&#91;+] Running GetFileDownloadUrls.*secrets_ for AWS \r\n&#91;+] Threat Actor: LUCR3 \r\n&#91;+] Severity: MEDIUM \r\n&#91;+] Description: Review use of CloudShell. Permiso seldom witnesses use of CloudShell outside of known attackers.This however may be a part of your normal business use case. \r\n<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Example 3 &#8211; Generate Report<\/strong><a href=\"https:\/\/github.com\/Permiso-io-tools\/CloudGrappler?tab=readme-ov-file#example-3---generate-report\"><\/a><\/h2>\n\n\n\n<p><code>python3 main.py -p -jo<\/code><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>reports\r\n\u2514\u2500\u2500 json\r\n    \u251c\u2500\u2500 AWS\r\n    \u2502\u00a0\u00a0 \u2514\u2500\u2500 2024-03-04 01:01 AM\r\n    \u2502\u00a0\u00a0     \u2514\u2500\u2500 cloudtrail-logs-00000000-ffffff--\r\n    \u2502\u00a0\u00a0         \u2514\u2500\u2500 testTrails\/AWSLogs\/00000000\/CloudTrail\/eu-east-1\/2024\/03\/03\r\n    \u2502\u00a0\u00a0             \u2514\u2500\u2500 GetFileDownloadUrls.*secrets_.json\r\n    \u2514\u2500\u2500 AZURE\r\n        \u2514\u2500\u2500 2024-03-04 01:01 AM\r\n            \u2514\u2500\u2500 logs\r\n                \u2514\u2500\u2500 cloudgrappler\r\n                    \u2514\u2500\u2500 okta_key.json<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Example 4 &#8211; Filtering Logs Based On Date Or Time<\/strong><a href=\"https:\/\/github.com\/Permiso-io-tools\/CloudGrappler?tab=readme-ov-file#example-4---filtering-logs-based-on-date-or-time\"><\/a><\/h2>\n\n\n\n<p><code>python3 main.py -p -sd 2024-02-15 -ed 2024-02-16<\/code><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Example 5 &#8211; Manually Adding Queries And Data Source Types<\/strong><a href=\"https:\/\/github.com\/Permiso-io-tools\/CloudGrappler?tab=readme-ov-file#example-5---manually-adding-queries-and-data-source-types\"><\/a><\/h2>\n\n\n\n<p><code>python3 main.py -q \u201cGetFileDownloadUrls.*secret\u201d, \u201dUpdateAccessKey\u201d -s '*'<\/code><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Example 6 &#8211; Running The Tool With Your Own Queries File<\/strong><a href=\"https:\/\/github.com\/Permiso-io-tools\/CloudGrappler?tab=readme-ov-file#example-6---running-the-tool-with-your-own-queries-file\"><\/a><\/h2>\n\n\n\n<p><code>python3 main.py -f new_file.json<\/code><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Running In Your Cloud And Authentication\u00a0<a href=\"https:\/\/github.com\/cado-security\/cloudgrep\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">cloudgrep<\/a><\/strong><a href=\"https:\/\/github.com\/Permiso-io-tools\/CloudGrappler?tab=readme-ov-file#running-in-your-cloud-and-authentication-cloudgrep\"><\/a><\/h3>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>AWS<\/strong><a href=\"https:\/\/github.com\/Permiso-io-tools\/CloudGrappler?tab=readme-ov-file#aws\"><\/a><\/h3>\n\n\n\n<p>Your system will need access to the S3 bucket. For example, if you are running on your laptop, you will need to\u00a0<a href=\"https:\/\/docs.aws.amazon.com\/cli\/latest\/userguide\/cli-chap-configure.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">configure the AWS CLI<\/a>. If you are running on an EC2, an\u00a0<a href=\"https:\/\/devopscube.com\/aws-iam-role-instance-profile\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Instance Profile<\/a>\u00a0is likely the best choice.<\/p>\n\n\n\n<p>If you run on an EC2 instance in the same region as the S3 bucket with a\u00a0<a href=\"https:\/\/aws.amazon.com\/blogs\/architecture\/overview-of-data-transfer-costs-for-common-architectures\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">VPC endpoint for S3<\/a>\u00a0you can\u00a0<a href=\"https:\/\/awsmadeeasy.com\/blog\/aws-s3-vpc-endpoint-transfer-cost-reduction\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">avoid egress charges<\/a>. You can authenticate in a\u00a0<a href=\"https:\/\/docs.aws.amazon.com\/cli\/latest\/userguide\/cli-chap-configure.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">number of ways<\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Azure<\/strong><a href=\"https:\/\/github.com\/Permiso-io-tools\/CloudGrappler?tab=readme-ov-file#azure\"><\/a><\/h3>\n\n\n\n<p>The simplest way to authenticate with Azure is to first run:<\/p>\n\n\n\n<p><code>az login<\/code><\/p>\n\n\n\n<p>This will open a browser window and prompt you to login to Azure.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known threat actors in popular cloud environments such as AWS and Azure. Notes To optimize your utilization of CloudGrappler, we recommend using shorter time ranges when querying for results. This approach enhances efficiency and accelerates the retrieval of information, [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":32259,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjohyoEj5sfvU7tLq4tYOQf1yAAEo8uTRa5cRAHuJpKwuxRaghY8Hgp9lFXt71UoVws9ID18AImeK55PR_N3qydfURUz1sn4D9qWMXGSy1uBEgD4LrwzQuvb4iet0sjmwBdxCmSAcVBE2AJHDUZgOEIApTb6jAUsoQPPBcZliHg-0ugf2bznqgiN1FJ3UiK\/s16000\/Awesome%20AppSec%20(1).webp","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[20],"tags":[6600,737,6321,6052,6325],"class_list":["post-32256","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-cloudgrappler","tag-cybersecurity","tag-informationsecurity","tag-kalilinux","tag-kalilinuxtools"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CloudGrappler - Elevating Cloud Security In AWS And Azure<\/title>\n<meta name=\"description\" content=\"CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/cloudgrappler\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CloudGrappler - Elevating Cloud Security In AWS And Azure\" \/>\n<meta property=\"og:description\" content=\"CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/cloudgrappler\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-11T06:01:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-11T06:01:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjohyoEj5sfvU7tLq4tYOQf1yAAEo8uTRa5cRAHuJpKwuxRaghY8Hgp9lFXt71UoVws9ID18AImeK55PR_N3qydfURUz1sn4D9qWMXGSy1uBEgD4LrwzQuvb4iet0sjmwBdxCmSAcVBE2AJHDUZgOEIApTb6jAUsoQPPBcZliHg-0ugf2bznqgiN1FJ3UiK\/s16000\/Awesome%20AppSec%20(1).webp\" \/>\n<meta name=\"author\" content=\"Varshini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjohyoEj5sfvU7tLq4tYOQf1yAAEo8uTRa5cRAHuJpKwuxRaghY8Hgp9lFXt71UoVws9ID18AImeK55PR_N3qydfURUz1sn4D9qWMXGSy1uBEgD4LrwzQuvb4iet0sjmwBdxCmSAcVBE2AJHDUZgOEIApTb6jAUsoQPPBcZliHg-0ugf2bznqgiN1FJ3UiK\/s16000\/Awesome%20AppSec%20(1).webp\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Varshini\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/cloudgrappler\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/cloudgrappler\/\"},\"author\":{\"name\":\"Varshini\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\"},\"headline\":\"CloudGrappler &#8211; Elevating Cloud Security In AWS And Azure\",\"datePublished\":\"2024-03-11T06:01:24+00:00\",\"dateModified\":\"2024-03-11T06:01:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/cloudgrappler\/\"},\"wordCount\":331,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/cloudgrappler\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjohyoEj5sfvU7tLq4tYOQf1yAAEo8uTRa5cRAHuJpKwuxRaghY8Hgp9lFXt71UoVws9ID18AImeK55PR_N3qydfURUz1sn4D9qWMXGSy1uBEgD4LrwzQuvb4iet0sjmwBdxCmSAcVBE2AJHDUZgOEIApTb6jAUsoQPPBcZliHg-0ugf2bznqgiN1FJ3UiK\/s16000\/Awesome%20AppSec%20(1).webp\",\"keywords\":[\"CloudGrappler\",\"cybersecurity\",\"informationsecurity\",\"kalilinux\",\"kalilinuxtools\"],\"articleSection\":[\"Cyber security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/cloudgrappler\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/cloudgrappler\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/cloudgrappler\/\",\"name\":\"CloudGrappler - Elevating Cloud Security In AWS And Azure\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/cloudgrappler\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/cloudgrappler\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjohyoEj5sfvU7tLq4tYOQf1yAAEo8uTRa5cRAHuJpKwuxRaghY8Hgp9lFXt71UoVws9ID18AImeK55PR_N3qydfURUz1sn4D9qWMXGSy1uBEgD4LrwzQuvb4iet0sjmwBdxCmSAcVBE2AJHDUZgOEIApTb6jAUsoQPPBcZliHg-0ugf2bznqgiN1FJ3UiK\/s16000\/Awesome%20AppSec%20(1).webp\",\"datePublished\":\"2024-03-11T06:01:24+00:00\",\"dateModified\":\"2024-03-11T06:01:25+00:00\",\"description\":\"CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/cloudgrappler\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/cloudgrappler\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjohyoEj5sfvU7tLq4tYOQf1yAAEo8uTRa5cRAHuJpKwuxRaghY8Hgp9lFXt71UoVws9ID18AImeK55PR_N3qydfURUz1sn4D9qWMXGSy1uBEgD4LrwzQuvb4iet0sjmwBdxCmSAcVBE2AJHDUZgOEIApTb6jAUsoQPPBcZliHg-0ugf2bznqgiN1FJ3UiK\/s16000\/Awesome%20AppSec%20(1).webp\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjohyoEj5sfvU7tLq4tYOQf1yAAEo8uTRa5cRAHuJpKwuxRaghY8Hgp9lFXt71UoVws9ID18AImeK55PR_N3qydfURUz1sn4D9qWMXGSy1uBEgD4LrwzQuvb4iet0sjmwBdxCmSAcVBE2AJHDUZgOEIApTb6jAUsoQPPBcZliHg-0ugf2bznqgiN1FJ3UiK\/s16000\/Awesome%20AppSec%20(1).webp\",\"width\":\"1600\",\"height\":\"900\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\",\"name\":\"Varshini\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"caption\":\"Varshini\"},\"description\":\"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.\",\"sameAs\":[\"http:\/\/kalilinuxtutorials.com\",\"https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/\"],\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CloudGrappler - Elevating Cloud Security In AWS And Azure","description":"CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/cloudgrappler\/","og_locale":"en_US","og_type":"article","og_title":"CloudGrappler - Elevating Cloud Security In AWS And Azure","og_description":"CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known","og_url":"https:\/\/kalilinuxtutorials.com\/cloudgrappler\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2024-03-11T06:01:24+00:00","article_modified_time":"2024-03-11T06:01:25+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjohyoEj5sfvU7tLq4tYOQf1yAAEo8uTRa5cRAHuJpKwuxRaghY8Hgp9lFXt71UoVws9ID18AImeK55PR_N3qydfURUz1sn4D9qWMXGSy1uBEgD4LrwzQuvb4iet0sjmwBdxCmSAcVBE2AJHDUZgOEIApTb6jAUsoQPPBcZliHg-0ugf2bznqgiN1FJ3UiK\/s16000\/Awesome%20AppSec%20(1).webp","type":"","width":"","height":""}],"author":"Varshini","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjohyoEj5sfvU7tLq4tYOQf1yAAEo8uTRa5cRAHuJpKwuxRaghY8Hgp9lFXt71UoVws9ID18AImeK55PR_N3qydfURUz1sn4D9qWMXGSy1uBEgD4LrwzQuvb4iet0sjmwBdxCmSAcVBE2AJHDUZgOEIApTb6jAUsoQPPBcZliHg-0ugf2bznqgiN1FJ3UiK\/s16000\/Awesome%20AppSec%20(1).webp","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"Varshini","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/cloudgrappler\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/cloudgrappler\/"},"author":{"name":"Varshini","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa"},"headline":"CloudGrappler &#8211; Elevating Cloud Security In AWS And Azure","datePublished":"2024-03-11T06:01:24+00:00","dateModified":"2024-03-11T06:01:25+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/cloudgrappler\/"},"wordCount":331,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/cloudgrappler\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjohyoEj5sfvU7tLq4tYOQf1yAAEo8uTRa5cRAHuJpKwuxRaghY8Hgp9lFXt71UoVws9ID18AImeK55PR_N3qydfURUz1sn4D9qWMXGSy1uBEgD4LrwzQuvb4iet0sjmwBdxCmSAcVBE2AJHDUZgOEIApTb6jAUsoQPPBcZliHg-0ugf2bznqgiN1FJ3UiK\/s16000\/Awesome%20AppSec%20(1).webp","keywords":["CloudGrappler","cybersecurity","informationsecurity","kalilinux","kalilinuxtools"],"articleSection":["Cyber security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/cloudgrappler\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/cloudgrappler\/","url":"https:\/\/kalilinuxtutorials.com\/cloudgrappler\/","name":"CloudGrappler - Elevating Cloud Security In AWS And Azure","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/cloudgrappler\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/cloudgrappler\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjohyoEj5sfvU7tLq4tYOQf1yAAEo8uTRa5cRAHuJpKwuxRaghY8Hgp9lFXt71UoVws9ID18AImeK55PR_N3qydfURUz1sn4D9qWMXGSy1uBEgD4LrwzQuvb4iet0sjmwBdxCmSAcVBE2AJHDUZgOEIApTb6jAUsoQPPBcZliHg-0ugf2bznqgiN1FJ3UiK\/s16000\/Awesome%20AppSec%20(1).webp","datePublished":"2024-03-11T06:01:24+00:00","dateModified":"2024-03-11T06:01:25+00:00","description":"CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/cloudgrappler\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/cloudgrappler\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjohyoEj5sfvU7tLq4tYOQf1yAAEo8uTRa5cRAHuJpKwuxRaghY8Hgp9lFXt71UoVws9ID18AImeK55PR_N3qydfURUz1sn4D9qWMXGSy1uBEgD4LrwzQuvb4iet0sjmwBdxCmSAcVBE2AJHDUZgOEIApTb6jAUsoQPPBcZliHg-0ugf2bznqgiN1FJ3UiK\/s16000\/Awesome%20AppSec%20(1).webp","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjohyoEj5sfvU7tLq4tYOQf1yAAEo8uTRa5cRAHuJpKwuxRaghY8Hgp9lFXt71UoVws9ID18AImeK55PR_N3qydfURUz1sn4D9qWMXGSy1uBEgD4LrwzQuvb4iet0sjmwBdxCmSAcVBE2AJHDUZgOEIApTb6jAUsoQPPBcZliHg-0ugf2bznqgiN1FJ3UiK\/s16000\/Awesome%20AppSec%20(1).webp","width":"1600","height":"900"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa","name":"Varshini","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","caption":"Varshini"},"description":"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.","sameAs":["http:\/\/kalilinuxtutorials.com","https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/"],"url":"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjohyoEj5sfvU7tLq4tYOQf1yAAEo8uTRa5cRAHuJpKwuxRaghY8Hgp9lFXt71UoVws9ID18AImeK55PR_N3qydfURUz1sn4D9qWMXGSy1uBEgD4LrwzQuvb4iet0sjmwBdxCmSAcVBE2AJHDUZgOEIApTb6jAUsoQPPBcZliHg-0ugf2bznqgiN1FJ3UiK\/s16000\/Awesome%20AppSec%20(1).webp","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":29718,"url":"https:\/\/kalilinuxtutorials.com\/vajra\/","url_meta":{"origin":32256,"position":0},"title":"Vajra &#8211; Your Weapon To Cloud","author":"Varshini","date":"August 24, 2023","format":false,"excerpt":"About Vajra Vajra is a tool with a graphical user interface that can be used to attack and look around in the Azure environment of a target. In Indian folklore, Vajra is the name of the weapon of the god of thunder and storms, Indra. Because it works with the\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhMavK2m55ocs3a8TmOGIb6wexVkvD4_o0JO7vRa96xAng-XHF_IzxPJ7WT6_by8wPL3mPnrDe651PTlBKb-HVxFqDOa5p687HuBiAcOcPjQFKIxUyoFkoMuPZsuvT_Rttn4TXU1qwyF15e2-O6woE1k9OhDEtT1i8Nrt6ltkKNmZd6-t_-hMsYs8tNjw\/s16000\/68747470733a2f2f6d65646961332e67697068792e636f6d2f6d656469612f705a4f4d76555666564b4a575030354b77772f67697068792e676966.gif?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":6642,"url":"https:\/\/kalilinuxtutorials.com\/scout-suite-multi-cloud-security-auditing-tool\/","url_meta":{"origin":32256,"position":1},"title":"Scout Suite : Multi-Cloud Security Auditing Tool","author":"R K","date":"September 28, 2019","format":false,"excerpt":"Scout Suite is an open source multi-cloud security-auditing tool, which enables security posture assessment of cloud environments. Using the APIs exposed by cloud providers, Scout Suite gathers configuration data for manual inspection and highlights risk areas. Rather than going through dozens of pages on the web consoles, Scout Suite presents\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":11267,"url":"https:\/\/kalilinuxtutorials.com\/skyark\/","url_meta":{"origin":32256,"position":2},"title":"SkyArk : A Cloud Security Project With Two Main Scanning Modules","author":"R K","date":"August 20, 2020","format":false,"excerpt":"SkyArk is a cloud security project with two main scanning modules: AzureStealth - Scans Azure environmentsAWStealth - Scan AWS environments These two scanning modules will discover the most privileged entities in the target AWS and Azure. The Main Goal - Discover The Most Privileged Cloud Users It currently focuses on\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":28810,"url":"https:\/\/kalilinuxtutorials.com\/thundercloud\/","url_meta":{"origin":32256,"position":3},"title":"ThunderCloud : Cloud Exploit Framework","author":"R K","date":"April 19, 2023","format":false,"excerpt":"ThunderCloud is a Cloud Exploit Framework. Usage python3 tc.py -h _______ _ _ _____ _ _ |__ __| | | | \/ ____| | | | | | | |__ _ _ _ __ __| | ___ _ __| | | | ___ _ _ __| | | | |\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgPmvFDKg8UXPdSgsgmdnTnmiaVlp-1akIdYvSDGll_KLKZfiacoB0VG-Y16t74HmN5gTL-ZclhaRi97exi_jmsGuYQUtColFab86xjtYoQrS3XLjgCY3nhTJE2ftHcob7SauTJJpHiLabHPBtrvzKv7Wi4VN7NmJtfWxrQwrnZPTok7Z5U0qda-gMo\/s728\/kali%20temp%285%29.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgPmvFDKg8UXPdSgsgmdnTnmiaVlp-1akIdYvSDGll_KLKZfiacoB0VG-Y16t74HmN5gTL-ZclhaRi97exi_jmsGuYQUtColFab86xjtYoQrS3XLjgCY3nhTJE2ftHcob7SauTJJpHiLabHPBtrvzKv7Wi4VN7NmJtfWxrQwrnZPTok7Z5U0qda-gMo\/s728\/kali%20temp%285%29.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgPmvFDKg8UXPdSgsgmdnTnmiaVlp-1akIdYvSDGll_KLKZfiacoB0VG-Y16t74HmN5gTL-ZclhaRi97exi_jmsGuYQUtColFab86xjtYoQrS3XLjgCY3nhTJE2ftHcob7SauTJJpHiLabHPBtrvzKv7Wi4VN7NmJtfWxrQwrnZPTok7Z5U0qda-gMo\/s728\/kali%20temp%285%29.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgPmvFDKg8UXPdSgsgmdnTnmiaVlp-1akIdYvSDGll_KLKZfiacoB0VG-Y16t74HmN5gTL-ZclhaRi97exi_jmsGuYQUtColFab86xjtYoQrS3XLjgCY3nhTJE2ftHcob7SauTJJpHiLabHPBtrvzKv7Wi4VN7NmJtfWxrQwrnZPTok7Z5U0qda-gMo\/s728\/kali%20temp%285%29.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":27458,"url":"https:\/\/kalilinuxtutorials.com\/cloudfox-automating-situational-awareness-for-cloud-penetration-tests\/","url_meta":{"origin":32256,"position":4},"title":"Cloudfox &#8211; Automating Situational Awareness For Cloud Penetration Tests","author":"R K","date":"October 13, 2022","format":false,"excerpt":"CloudFox helps you gain situational awareness in unfamiliar cloud environments. It\u2019s an open source command line tool created to help penetration testers and other offensive security professionals find exploitable attack paths in cloud infrastructure. CloudFox helps you answer the following common questions (and many more): What regions is this AWS\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjcFGgykuWe-W6_kEnUOlLoyRhiccYxQOjoRg_oiae1VTN9gXMe1wEiSwPm8Nhnuid3smlkEJdfey4Hol9YVsvm-Wv4OJVdNTdDBS-KBzrI-ouf0l0XAH4h-6mmiG6gxP2Cqv_IoUqrzz2Z1dpj6S4dZ1tHcY-BzRK_Os96vN2b5Q3ZmFl55GMwMbCL\/s728\/CloudFox.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjcFGgykuWe-W6_kEnUOlLoyRhiccYxQOjoRg_oiae1VTN9gXMe1wEiSwPm8Nhnuid3smlkEJdfey4Hol9YVsvm-Wv4OJVdNTdDBS-KBzrI-ouf0l0XAH4h-6mmiG6gxP2Cqv_IoUqrzz2Z1dpj6S4dZ1tHcY-BzRK_Os96vN2b5Q3ZmFl55GMwMbCL\/s728\/CloudFox.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjcFGgykuWe-W6_kEnUOlLoyRhiccYxQOjoRg_oiae1VTN9gXMe1wEiSwPm8Nhnuid3smlkEJdfey4Hol9YVsvm-Wv4OJVdNTdDBS-KBzrI-ouf0l0XAH4h-6mmiG6gxP2Cqv_IoUqrzz2Z1dpj6S4dZ1tHcY-BzRK_Os96vN2b5Q3ZmFl55GMwMbCL\/s728\/CloudFox.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjcFGgykuWe-W6_kEnUOlLoyRhiccYxQOjoRg_oiae1VTN9gXMe1wEiSwPm8Nhnuid3smlkEJdfey4Hol9YVsvm-Wv4OJVdNTdDBS-KBzrI-ouf0l0XAH4h-6mmiG6gxP2Cqv_IoUqrzz2Z1dpj6S4dZ1tHcY-BzRK_Os96vN2b5Q3ZmFl55GMwMbCL\/s728\/CloudFox.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":33207,"url":"https:\/\/kalilinuxtutorials.com\/cloud-osint\/","url_meta":{"origin":32256,"position":5},"title":"Cloud OSINT &#8211; Navigating Tools, Techniques, And Resources For Effective Cloud Intelligence","author":"Varshini","date":"June 4, 2024","format":false,"excerpt":"A repository with information related to different resources, tools, and techniques related to Cloud OSINT. Cloud OSINT (Open Source Intelligence) is pivotal in the digital age for gathering and analyzing data from cloud-based services. This guide delves into a myriad of tools, techniques, and resources that specialize in extracting valuable\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEimIrt98iKfGLq5FWAreJHzynJoxx4JymWaVN7ABoJPCpoUSwPbGTR_52rJgi7n4jh85ZcKem09pSsgCiG1zOyQSTvhaq40v08CaWoa9GK75TwfOa0iOborlQ5MudDiPzOwSiBrKTvx3HU8mRknoj9CDMfdYT-hMiYaGuV6knghpXVA9HQl8c9STGSIBMFH\/s16000\/Cloud%20OSINT.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEimIrt98iKfGLq5FWAreJHzynJoxx4JymWaVN7ABoJPCpoUSwPbGTR_52rJgi7n4jh85ZcKem09pSsgCiG1zOyQSTvhaq40v08CaWoa9GK75TwfOa0iOborlQ5MudDiPzOwSiBrKTvx3HU8mRknoj9CDMfdYT-hMiYaGuV6knghpXVA9HQl8c9STGSIBMFH\/s16000\/Cloud%20OSINT.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEimIrt98iKfGLq5FWAreJHzynJoxx4JymWaVN7ABoJPCpoUSwPbGTR_52rJgi7n4jh85ZcKem09pSsgCiG1zOyQSTvhaq40v08CaWoa9GK75TwfOa0iOborlQ5MudDiPzOwSiBrKTvx3HU8mRknoj9CDMfdYT-hMiYaGuV6knghpXVA9HQl8c9STGSIBMFH\/s16000\/Cloud%20OSINT.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEimIrt98iKfGLq5FWAreJHzynJoxx4JymWaVN7ABoJPCpoUSwPbGTR_52rJgi7n4jh85ZcKem09pSsgCiG1zOyQSTvhaq40v08CaWoa9GK75TwfOa0iOborlQ5MudDiPzOwSiBrKTvx3HU8mRknoj9CDMfdYT-hMiYaGuV6knghpXVA9HQl8c9STGSIBMFH\/s16000\/Cloud%20OSINT.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEimIrt98iKfGLq5FWAreJHzynJoxx4JymWaVN7ABoJPCpoUSwPbGTR_52rJgi7n4jh85ZcKem09pSsgCiG1zOyQSTvhaq40v08CaWoa9GK75TwfOa0iOborlQ5MudDiPzOwSiBrKTvx3HU8mRknoj9CDMfdYT-hMiYaGuV6knghpXVA9HQl8c9STGSIBMFH\/s16000\/Cloud%20OSINT.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEimIrt98iKfGLq5FWAreJHzynJoxx4JymWaVN7ABoJPCpoUSwPbGTR_52rJgi7n4jh85ZcKem09pSsgCiG1zOyQSTvhaq40v08CaWoa9GK75TwfOa0iOborlQ5MudDiPzOwSiBrKTvx3HU8mRknoj9CDMfdYT-hMiYaGuV6knghpXVA9HQl8c9STGSIBMFH\/s16000\/Cloud%20OSINT.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/32256","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=32256"}],"version-history":[{"count":1,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/32256\/revisions"}],"predecessor-version":[{"id":32257,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/32256\/revisions\/32257"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/32259"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=32256"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=32256"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=32256"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}