AWS Pass-through Proxy

AWS API Gateway:

Figure 1: AWS Management Console
Figure 2: Identity and Access Management
Figure 3: Group Name
Figure 4: Group Policy
Figure 5: Create Group
Figure 6: Groups
Figure 7: Users
Figure 8: User Name
Figure 9: Added Group
Figure 10: User Tags
Figure 11: Create User
Figure 12: Access and Secret Keys


Figure 13: Installation


Figure 14: FireProx Execution
Figure 15: Proxied Redirect
Figure 16: Whois

Shout Out:






Cyber Security Enthusiast

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Company I’m following: HYPR

{UPDATE} Pudding Monsters Hack Free Resources Generator

UK 3rd for ETH ownership as crypto adoption grows 1% in December: Survey

Tutorial for New Blind Box

A cyberattack is a malicious and purposive attempt by an individual or organization to infringe…

Playing On A Crypto Site If You Are Self-Excluded GamStop

The Road to Ransomware Resilience, Part One: The State of Ransomware

Ransomware Analysis, Understanding Active and Emerging Threats & Developing a More Effective Defense to Ransomware

CyCraft Announces Results From Latest ATT&CKⓇ Evaluations

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Mike Bond

Mike Bond

Cyber Security Enthusiast

More from Medium

A Beginner’s Guide To Hosting A Static Website With S3 & CloudFront

How to deploy a functioning WordPress web page in 30 minutes

Using AWS CLI to Create, Users, Groups and S3 Buckets

Working with AWS WAF