Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Breaking and Securing Cloud Platforms

Hack In The Box Security Conference via YouTube

Overview

Explore cloud platform security vulnerabilities and best practices in this 46-minute conference talk from the Hack In The Box Security Conference. Delve into real-world cases of exposed cloud services, including S3 buckets, container services, and authentication bypasses. Learn how attackers exploit these weaknesses for credit card harvesting, botnet deployment, and crypto-mining. Gain insights into defending cloud deployments by hardening services and optimizing configurations. Discover the attacker's perspective on cloud environments and acquire practical strategies to enhance the security of your organization's cloud infrastructure. Benefit from the expertise of Fyodor Yarochkin, a senior researcher with extensive experience in threat investigation and penetration testing in the Asia-Pacific region.

Syllabus

Intro
Agenda: "Cloud War Stories"
Guess the bucket: Trail and error!
Static website hosting on AWS S3
Writable buckets lead to data exfil
A variation: Reflection attacks
Why did this work? A magic link-local address
Mitigation
Cryptominer infections
Exfiltration
Clouds - widely adopted by cybercriminals
Badness breakdown by ASN
Free Google Cloud instances
Sale of cloud instances
Credentials trade
a blackhat's True Cloud

Taught by

Hack In The Box Security Conference

Reviews

Start your review of Breaking and Securing Cloud Platforms

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.