YoVDO

Dark Clouds Ahead - Attacking a Cloud Foundry Implementation

Offered By: WEareTROOPERS via YouTube

Tags

TROOPERS Courses Cloud Foundry Courses SAP HANA Courses Cloud Security Courses

Course Description

Overview

Explore the security vulnerabilities in Cloud Foundry implementations through this 49-minute conference talk. Delve into the core components of Cloud Foundry, its various implementations, and key concepts. Gain insights into SAP HANA and XS Advanced, with a focus on the XS Advanced Cloud Foundry XSA. Examine the role of the Controller, its authorization model, and database connections. Investigate potential security risks and protections, and uncover what can go wrong in Cloud Foundry environments. Learn valuable lessons about cloud security and potential attack vectors in this informative presentation from WEareTROOPERS.

Syllabus

Intro
Introduction Cloudfoundry?
Cloud foundry components
Cloud foundry implementations
Cloudfoundry 101 (Concepts)
SAP HANA, XS Advanced overview
1 XS Advanced Cloud foundry XSA
Who is the Controller?
Controller's Authorization Model
Connection to DB
What about the mentioned protections?
What happened?


Taught by

WEareTROOPERS

Related Courses

Modmob Tools - Home Made Tools to Test Mobile Devices and Monitor Networks
WEareTROOPERS via YouTube
Microsoft IT - Secure Journey to IPv6-Only
WEareTROOPERS via YouTube
Introducing Faction - A Modern, Powerful, Multiplayer C2 Framework
WEareTROOPERS via YouTube
A Diet of Poisoned Fruit - Designing Implants and OT Payloads for ICS Embedded Devices
WEareTROOPERS via YouTube
Hardware Side Channel Attacks on the Cheapest
WEareTROOPERS via YouTube