Internet Scale Analysis of AWS Cognito Security

Internet Scale Analysis of AWS Cognito Security

BruCON Security Conference via YouTube Direct link

Challenge #2: Enumerate permissions

13 of 26

13 of 26

Challenge #2: Enumerate permissions

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Internet Scale Analysis of AWS Cognito Security

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Full AWS account compromise
  3. 3 Privilege escalation
  4. 4 What Is Amazon Cognito?
  5. 5 Amazon Cognito use case
  6. 6 Create new identity pool
  7. 7 Assign IAM roles to identities
  8. 8 IAM policy example
  9. 9 Internet Scale analysis
  10. 10 Challenge #1: Identity Pool UUID4
  11. 11 Google only indexes text
  12. 12 Other (boring) sources
  13. 13 Challenge #2: Enumerate permissions
  14. 14 Enumerate permissions and avoid jail time
  15. 15 Enumerate permissions / Performance
  16. 16 Privileges and roles
  17. 17 Identity pool sources
  18. 18 Usable identity pools
  19. 19 Insecure configurations
  20. 20 Lambda function environment variables
  21. 21 Insecure by default documentation
  22. 22 Restrictions on Unauthenticated Cognito roles
  23. 23 Developer can shoot himself in the foot
  24. 24 Least privilege principle and more...
  25. 25 Hard-coded credentials
  26. 26 Key takeaways

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.