Fighting the Previous War - Attacking and Defending in the Era of the Cloud

Fighting the Previous War - Attacking and Defending in the Era of the Cloud

Black Hat via YouTube Direct link

Intro

1 of 41

1 of 41

Intro

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Fighting the Previous War - Attacking and Defending in the Era of the Cloud

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Why we are here
  3. 3 DDoS
  4. 4 Footprinting
  5. 5 Uber SendGrid
  6. 6 Canary Tokens
  7. 7 Would you know
  8. 8 Exploitation
  9. 9 Compromise
  10. 10 Persistence
  11. 11 AWS
  12. 12 Functions in AWS
  13. 13 AWS Permissions
  14. 14 Search Space
  15. 15 Search the Internet
  16. 16 S3 buckets
  17. 17 Open S3 buckets
  18. 18 SQS
  19. 19 Queue URLs
  20. 20 AWS Forums
  21. 21 API Keys
  22. 22 Identity Documents
  23. 23 AMIs
  24. 24 AMIs in private lists
  25. 25 Side effects of API calls
  26. 26 We call 888
  27. 27 Lateral Movement
  28. 28 Cloud Formation
  29. 29 Modifying Cloud Formation Templates
  30. 30 Cloud Formation Templates in Language
  31. 31 Simple System Management
  32. 32 Privilege Escalation
  33. 33 Lambda Persistence
  34. 34 Lambda Persistence Example
  35. 35 Subverting Lambdas
  36. 36 Credentials
  37. 37 Lockout
  38. 38 Federation
  39. 39 Reusing Roles
  40. 40 Organizations
  41. 41 Login Disruption

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.