← All talks

Pwned Cloud Society

BSides SLC · 201744:04204 viewsPublished 2017-06Watch on YouTube ↗
Speakers
Tags
CategoryTechnical
StyleTalk
About this talk
With more companies rapidly leveraging cloud providers for services, how do we more effectively exploit and expand access within these cloud-based environments? This session will help you hit the ground running with your next security assessment by demonstrating common weakness and misconfigurations I have seen in real world AWS and Azure implementations. This includes leveraging undocumented features to expand access, pivoting from the compute layer to cloud management interfaces, and manipulating logging to cover your tracks. Cloud: it's a privilege, not a right.