Главная
Study mode:
on
1
Intro
2
This talk in one slide
3
Motivation
4
Avoiding unexpected outcomes
5
DNS Tunneling - Rapid Review
6
Most critical difference vs legacy data centers
7
Hypothetical victim
8
overview
9
Attack #1 - CatSwap.io web server & DNS
10
VPC DNS
11
CatSwap.io container design
12
AWS ECS
13
DNS Tunnels in Containers
14
Applying - containers (and hosts)
15
Applying what you have learned - DNS
16
Exploiting Service Endpoints
17
Service endpoints types & exfiltration options
18
Attack #3 - CatSwap.io image cluster design
19
Storage Service Endpoint
20
Applying - Service Endpoints
21
Key Takeaways
22
What to do tomorrow
23
Final thoughts
24
Resources
25
References & Further Reading
Description:
Explore common infrastructure exploits in AWS, GCP, and Azure servers and containers in this 33-minute RSA Conference talk. Gain insights into the practical risks posed by misunderstanding VPC DNS and other cloud-specific vulnerabilities. Learn about exfiltration risks in cloud hosting services due to DNS and VPC endpoints, understand the limitations of legacy security measures in cloud environments, and discover mitigations available for both server and serverless (container) designs. Delve into topics such as DNS tunneling, VPC DNS, container security, and service endpoint exploitation. Through concrete examples and a hypothetical victim scenario, grasp the critical differences between legacy data centers and cloud architectures. Walk away with key takeaways and actionable steps to improve your cloud security posture, along with valuable resources for further learning.

Common Infrastructure Exploits in AWS - GCP - Azure Servers and Containers

RSA Conference
Add to list
0:00 / 0:00