Главная
Study mode:
on
1
Intro
2
Evolution
3
Life cycle
4
Benefits and downsides
5
Common Use Cases
6
Serverless Security
7
Challenge Accepted
8
Code Injection
9
Checkmarks
10
payload
11
AWS SDK
12
Persistence
13
Onetime infection
14
Cross contamination
15
Lambda security
16
Lambda security parameters
17
Execution roll
18
Documentation
19
Virtual Private Cloud
20
Summary
Description:
Explore the security implications of serverless computing in this AppSecUSA 2018 conference talk. Discover how malware can infiltrate serverless environments as Erez Yalon presents the first-ever Remote Code Execution (RCE) attack in a serverless setting. Learn about the architecture and advantages of serverless computing, understand the associated security challenges, and witness a live demonstration of data infiltration, infection, and exfiltration. Gain insights into self-duplicating attacks that persist within the code and observe their execution across various serverless platforms. Delve into topics such as code injection, AWS SDK exploitation, Lambda security parameters, and Virtual Private Cloud considerations. Walk away with best practices and tips for maintaining security in serverless environments, equipping yourself to address critical questions organizations face when transitioning to this technology.

Serverless Infections - Malware Just Found a New Home

OWASP Foundation
Add to list
0:00 / 0:00