Главная
Study mode:
on
1
Intro
2
About Me
3
About the Topic
4
Pentesting
5
NetSec DevOps
6
Pentesting Methodology
7
Phase 1 Reconnaissance
8
DNS Recon Tools
9
AWS Buckets
10
Recon Tools
11
Proves Check
12
Phase 3 Exploits
13
Billing App
14
Metadata Server
15
GraphQL
16
Kubernetes
17
Lambda Hack
18
Pakku
19
Metasploit
20
fingerprinting
21
What we learned
22
What to take away
Description:
Explore tools and techniques for conducting penetration tests against AWS-hosted systems and applications in this 55-minute conference talk from LASCON 2018. Dive into pentesting methodology, covering phases such as reconnaissance and exploitation. Learn about DNS recon tools, AWS buckets, and various recon techniques. Discover exploits for billing apps, metadata servers, GraphQL, Kubernetes, and Lambda. Gain insights on Metasploit fingerprinting and walk away with valuable lessons and key takeaways for enhancing cloud security auditing skills.

Poking Holes in the Cloud: Auditing AWS Security - 2018

LASCON
Add to list
0:00 / 0:00