Breaking and Securing Cloud Platforms

Breaking and Securing Cloud Platforms

Hack In The Box Security Conference via YouTube Direct link

Clouds - widely adopted by cybercriminals

11 of 16

11 of 16

Clouds - widely adopted by cybercriminals

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Breaking and Securing Cloud Platforms

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Agenda: "Cloud War Stories"
  3. 3 Guess the bucket: Trail and error!
  4. 4 Static website hosting on AWS S3
  5. 5 Writable buckets lead to data exfil
  6. 6 A variation: Reflection attacks
  7. 7 Why did this work? A magic link-local address
  8. 8 Mitigation
  9. 9 Cryptominer infections
  10. 10 Exfiltration
  11. 11 Clouds - widely adopted by cybercriminals
  12. 12 Badness breakdown by ASN
  13. 13 Free Google Cloud instances
  14. 14 Sale of cloud instances
  15. 15 Credentials trade
  16. 16 a blackhat's True Cloud

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.