Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Fighting the Previous War - Attacking and Defending in the Era of the Cloud

Black Hat via YouTube

Overview

Explore a comprehensive conference talk that updates attack and defense playbooks for the cloud era. Delve into the interdependence of cloud systems and learn about pivoting through and defending these setups. Examine topics such as DDoS, footprinting, exploitation, persistence, and lateral movement in AWS environments. Discover techniques for searching S3 buckets, utilizing API keys, and manipulating Cloud Formation templates. Investigate privilege escalation methods, Lambda persistence, and federation in cloud setups. Gain insights on both offensive and defensive strategies for modern cloud-based infrastructures, equipping red and blue teamers with updated knowledge for the current threat landscape.

Syllabus

Intro
Why we are here
DDoS
Footprinting
Uber SendGrid
Canary Tokens
Would you know
Exploitation
Compromise
Persistence
AWS
Functions in AWS
AWS Permissions
Search Space
Search the Internet
S3 buckets
Open S3 buckets
SQS
Queue URLs
AWS Forums
API Keys
Identity Documents
AMIs
AMIs in private lists
Side effects of API calls
We call 888
Lateral Movement
Cloud Formation
Modifying Cloud Formation Templates
Cloud Formation Templates in Language
Simple System Management
Privilege Escalation
Lambda Persistence
Lambda Persistence Example
Subverting Lambdas
Credentials
Lockout
Federation
Reusing Roles
Organizations
Login Disruption

Taught by

Black Hat

Reviews

Start your review of Fighting the Previous War - Attacking and Defending in the Era of the Cloud

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.