Главная
Study mode:
on
1
Introduction
2
Code Spaces Breach
3
Hide and Seek
4
AWS Intro
5
Infection Phase
6
Infection Through AWS
7
Infection Through ThirdParty Services
8
Survival From Attackers Perspective
9
Demo
10
Custom Key
11
Persistency
12
New Users
13
Summary
14
What can you do
Description:
Explore advanced AWS security threats and countermeasures in this Black Hat conference talk. Delve into pre-infection, post-infection, and advanced persistency techniques targeting AWS environments. Learn about "account jumping" for compromising PaaS and IaaS resources, poisoned AMIs, and leveraging S3 and CloudFront for credential theft. Discover how attackers manipulate AWS resources for MITM attacks and hide malicious code using Lambda functions. Examine the risks in hybrid deployments and methods to compromise on-premise datacenters. Gain insights into best practices for protection, including bastion gateways, CASB solutions, AWS audit and HSM capabilities, and isolation approaches. Understand the evolving landscape of AWS-focused APTs and equip yourself with knowledge to safeguard cloud environments.

Account Jumping Post Infection Persistency & Lateral Movement in AWS

Black Hat
Add to list
0:00 / 0:00