Overview
Syllabus
Intro
Why we are here
DDoS
Footprinting
Uber SendGrid
Canary Tokens
Would you know
Exploitation
Compromise
Persistence
AWS
Functions in AWS
AWS Permissions
Search Space
Search the Internet
S3 buckets
Open S3 buckets
SQS
Queue URLs
AWS Forums
API Keys
Identity Documents
AMIs
AMIs in private lists
Side effects of API calls
We call 888
Lateral Movement
Cloud Formation
Modifying Cloud Formation Templates
Cloud Formation Templates in Language
Simple System Management
Privilege Escalation
Lambda Persistence
Lambda Persistence Example
Subverting Lambdas
Credentials
Lockout
Federation
Reusing Roles
Organizations
Login Disruption
Taught by
Black Hat