Completed
Full AWS account compromise
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Internet Scale Analysis of AWS Cognito Security
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Full AWS account compromise
- 3 Privilege escalation
- 4 What Is Amazon Cognito?
- 5 Amazon Cognito use case
- 6 Create new identity pool
- 7 Assign IAM roles to identities
- 8 IAM policy example
- 9 Internet Scale analysis
- 10 Challenge #1: Identity Pool UUID4
- 11 Google only indexes text
- 12 Other (boring) sources
- 13 Challenge #2: Enumerate permissions
- 14 Enumerate permissions and avoid jail time
- 15 Enumerate permissions / Performance
- 16 Privileges and roles
- 17 Identity pool sources
- 18 Usable identity pools
- 19 Insecure configurations
- 20 Lambda function environment variables
- 21 Insecure by default documentation
- 22 Restrictions on Unauthenticated Cognito roles
- 23 Developer can shoot himself in the foot
- 24 Least privilege principle and more...
- 25 Hard-coded credentials
- 26 Key takeaways