YoVDO

Modern Post Exploitation - The Ghost In The Cloud

Offered By: Hack In The Box Security Conference via YouTube

Tags

Hack In The Box Security Conference Courses Cybersecurity Courses Identity and Access Management (IAM) Courses Enterprise Architecture Courses Privilege Escalation Courses

Course Description

Overview

Explore modern post-exploitation techniques in cloud environments through this 56-minute conference talk from Hack In The Box Security Conference. Delve into the attacker's mindset, focusing on exploiting weaknesses in Identity and Access Management (IAM) mechanisms within enterprise applications. Learn how attackers leverage compromised accounts in cloud-native organizations that lack traditional internal networks. Examine real-world scenarios using reproduced environments, covering topics such as modern enterprise architectures, app analysis for targeting, and a taxonomy of IAM-based methods for discovery, persistence, privilege escalation, and exfiltration. Gain insights into emerging security tools like CIEM, SSPM, and SMP, and understand evasion techniques. Benefit from the expertise of cybersecurity researcher Gal Diskin as he shares his extensive experience in the field.

Syllabus

Intro
Once upon a time
SCIM provisioning
Real World Example
Automating access - ABAC
How to analyze a new app you need to target
Example analyzing GitHub
IAM Gadgets - Hiding access
IAM Gadgets - Exfiltration
Let's enumerate the access
Self Service to the rescue
Data links are free exfiltration tools
Takeaways


Taught by

Hack In The Box Security Conference

Related Courses

Introduction to Enterprise Architecture
Enterprise Architects via Open2Study
The Essentials of the TOGAF 9.1 ADM
IEEE via edX
Business Model Metrics and Advanced Tools
Delft University of Technology via edX
Enterprise Architecture
St. Petersburg State Polytechnic University via Coursera
Enterprise Architecture in the Era of the Intelligent Enterprise
SAP Learning