Главная
Study mode:
on
1
Intro
2
Full AWS account compromise
3
Privilege escalation
4
What Is Amazon Cognito?
5
Amazon Cognito use case
6
Create new identity pool
7
Assign IAM roles to identities
8
IAM policy example
9
Internet Scale analysis
10
Challenge #1: Identity Pool UUID4
11
Google only indexes text
12
Other (boring) sources
13
Challenge #2: Enumerate permissions
14
Enumerate permissions and avoid jail time
15
Enumerate permissions / Performance
16
Privileges and roles
17
Identity pool sources
18
Usable identity pools
19
Insecure configurations
20
Lambda function environment variables
21
Insecure by default documentation
22
Restrictions on Unauthenticated Cognito roles
23
Developer can shoot himself in the foot
24
Least privilege principle and more...
25
Hard-coded credentials
26
Key takeaways
Description:
Explore the results of an internet-scale analysis of AWS Cognito security configurations in this 57-minute conference talk from BruCON 0x0B. Delve into the identification of 2500 identity pools, which granted access to over 13000 S3 buckets, 1200 DynamoDB tables, and 1500 Lambda functions. Begin with an introduction to AWS Cognito and its configuration options for granting end-users direct access to AWS resources. Examine a step-by-step explanation of configuration weaknesses using specific demos, followed by an automated approach for large-scale analysis. Learn about the challenges of identifying Cognito identity pool IDs, including the process of downloading and decompiling thousands of APKs from the Google Play store. Discover the in-depth permission brute-force tool used to analyze unauthenticated roles and identify potential breaches of the least privilege principle. Gain valuable recommendations for secure service configuration and insights into the reasons behind widespread security issues, including poor documentation and examples on the AWS site. Read more

Internet Scale Analysis of AWS Cognito Security

BruCON Security Conference
Add to list
0:00 / 0:00