Главная
Study mode:
on
1
Introduction
2
Speaker Introduction
3
Why AWS
4
How to test AWS services
5
EC2 overview
6
Attacking EC2 instances
7
EC2 Instances
8
AWS ME
9
What Attacks Can Work
10
Training Mode
11
Print stored secrets
12
Attack surface
13
Whats next
14
IAM
15
IAM Pass Role
16
IAM Policy
17
AWS Escalation Tool
18
Trust Relationships
19
Automated Attacks
20
Sample
21
Questions
Description:
Explore post-exploitation techniques for cloud service providers in this 54-minute webcast presented by Mohammed Aldoub, an independent security consultant and Blackhat trainer. Gain insights into how hackers attack and pivot within cloud environments, with a focus on AWS. Witness demonstrations of the "barq" AWS post-exploitation tool and learn methods for gaining and maintaining access, including account backdooring, cloud-wide credential theft, and other attack strategies. Designed for penetration testers, this webcast enhances understanding of cloud components and their interactions, enabling better risk assessment and penetration testing in cloud environments. Delve into topics such as EC2 instances, AWS ME, IAM policies, trust relationships, and automated attacks, providing a comprehensive overview of cloud security vulnerabilities and exploitation techniques.

Post-Exploitation of Cloud Service Providers

RSA Conference
Add to list