Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Breaching AWS Through Shadow Resources - Critical Vulnerabilities and Security Implications

DEFCONConference via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a security conference presentation that reveals six critical vulnerabilities discovered in AWS services, focusing on the complex interactions between cloud resources and their potential security implications. Dive into detailed explanations of vulnerabilities ranging from remote code execution to information disclosure and denial of service attacks, all of which were subsequently patched by AWS. Learn about the methodology used to identify these security flaws, including techniques for privilege escalation and mapping service external resources. Gain access to an open-source tool for researching service internal API calls and discover methods to audit accounts for historical vulnerability exposure. Master essential best practices for developers working in complex cloud environments and understand emerging areas of focus for cloud security researchers. The presentation concludes with valuable lessons learned and future research directions in cloud security.

Syllabus

DEF CON 32 - Breaching AWS Through Shadow Resources - Yakir Kadkoda, Michael Katchinskiy, Ofek Itach

Taught by

DEFCONConference

Reviews

Start your review of Breaching AWS Through Shadow Resources - Critical Vulnerabilities and Security Implications

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.