Главная
Study mode:
on
1
Intro
2
Software Service
3
How Fast Companies Work
4
Breaking In
5
Shell on Jenkins
6
Artifact Servers
7
Containers
8
Configuration Management
9
Microservices
10
Cloud
11
Disrupting Logging
12
AWS Remote Access Tool
13
CloudTrail
14
New Access Keys
15
Any Questions
Description:
Explore techniques for attacking modern Software-as-a-Service (SaaS) companies in this conference talk from NolaCon 2017. Delve into the rapid development practices of fast-moving tech firms and learn how to exploit vulnerabilities in their infrastructure. Discover methods for gaining shell access on Jenkins, compromising artifact servers, and exploiting container weaknesses. Examine the security implications of configuration management tools, microservices architectures, and cloud environments. Investigate strategies for disrupting logging systems, leveraging AWS remote access tools, and manipulating CloudTrail. Gain insights into creating new access keys and understand the potential attack vectors in contemporary SaaS ecosystems.

Attacking Modern SaaS Companies

Add to list
0:00 / 0:00