Explore techniques for attacking modern Software-as-a-Service (SaaS) companies in this conference talk from NolaCon 2017. Delve into the rapid development practices of fast-moving tech firms and learn how to exploit vulnerabilities in their infrastructure. Discover methods for gaining shell access on Jenkins, compromising artifact servers, and exploiting container weaknesses. Examine the security implications of configuration management tools, microservices architectures, and cloud environments. Investigate strategies for disrupting logging systems, leveraging AWS remote access tools, and manipulating CloudTrail. Gain insights into creating new access keys and understand the potential attack vectors in contemporary SaaS ecosystems.
Overview
Syllabus
Intro
Software Service
How Fast Companies Work
Breaking In
Shell on Jenkins
Artifact Servers
Containers
Configuration Management
Microservices
Cloud
Disrupting Logging
AWS Remote Access Tool
CloudTrail
New Access Keys
Any Questions