Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Exploiting Cloud Provider Vulnerabilities for Initial Access in AWS

DEFCONConference via YouTube

Overview

Explore critical AWS security vulnerabilities and exploitation techniques in this DEF CON 32 conference talk. Dive deep into the mechanisms behind IAM role trust relationships with AWS services and learn about previously discovered vulnerabilities that enabled unauthorized cloud resource access. Examine a real-world confused deputy vulnerability in AWS AppSync that allowed IAM role hijacking across accounts. Understand potential misconfigurations in IAM roles using sts:AssumeRoleWithWebIdentity that could grant unauthorized global access without authentication, affecting Amazon Cognito, GitHub Actions, and other services. Discover a vulnerability in AWS Amplify that exposed customer IAM roles to takeover attempts, and learn essential security practices to protect cloud environments against similar zero-day exploits. Master the techniques adversaries use to identify and exploit AWS service vulnerabilities, moving beyond traditional misconfiguration and credential leak scenarios to understand cloud provider-side security weaknesses.

Syllabus

DEF CON 32 - Exploiting Cloud Provider Vulnerabilities for Initial Access - Nick Frichette

Taught by

DEFCONConference

Reviews

Start your review of Exploiting Cloud Provider Vulnerabilities for Initial Access in AWS

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.