YoVDO

Pivoting in Amazon Clouds

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Python Courses Penetration Testing Courses Cloud Security Courses AWS Security Courses

Course Description

Overview

Explore advanced techniques for pivoting and escalating privileges in Amazon Web Services (AWS) environments in this Black Hat conference talk. Learn about various AWS components including EC2, SQS, IAM, RDS, meta-data, and user-data, as well as how to exploit misconfigurations to gain unauthorized access to operating systems, databases, application source code, and Amazon's services through its API. Follow a step-by-step demonstration of how an attacker can progress from exploiting an initial web application vulnerability to ultimately compromising the root account of an Amazon user. Discover cloud-specific vulnerabilities and weaknesses, and gain insights into tools that can enumerate AWS service access, create new AWS users, extract credentials, clone databases, and inject malicious tasks. Understand the intricacies of AWS security and learn how to better protect your cloud infrastructure against potential threats.

Syllabus

Introduction
HTTP request vulnerability
Change URL parameter
Instance metadata
AMI
Python
Nimbostratus
User Data
Source Code Review
Amazon Cloud Architecture
Instance Profiles
Credentials
Dump Permissions
SQS
Salary
Serializer
Salary Pickle
Executing arbitrary commands
Worker credentials
IAM
IAM API
Create IAM User
Create Snapshot
Source Code
Thank You
Questions


Taught by

Black Hat

Related Courses

Network Security
Georgia Institute of Technology via Udacity
Proactive Computer Security
University of Colorado System via Coursera
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera
Hacker101
HackerOne via Independent
CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent