UN-EDITED | Securing AWS: Cloud Vulnerability Pentesting Techniques | Beau Bullock




One of the most interesting things about cloud environments is that they tend to have an underlying API that can be leveraged for management of resources. But this API can also be abused by attackers for malicious purposes. In this Black Hills Information Security (BHIS) webcast, senior security analyst Beau Bullock shows how attackers targeting cloud-based services like Amazon Web Services (AWS) can leverage API access to laterally move from resource to resource. Examples of post-compromise reconnaissance and privilege escalation will be detailed. A multi-resource pivot will be demonstrated to show how cloud-based lateral movement can look. Chat with your fellow attendees in the Infosec Knowledge Sharing Discord server here: https://ift.tt/uo4liey -- in the #webcast-live-chat channel.

Hello and welcome to the temple of cybersecurity. Now you are watching UN-EDITED | Securing AWS: Cloud Vulnerability Pentesting Techniques | Beau Bullock published at November 10, 2022 at 02:20PM.
For more hacking info and free hacking tutorials visit: https://ift.tt/04nDzmj
follow us on:

Youtube: https://www.youtube.com/channel/UCiu1SUqoBRbnClQ5Zh9-0hQ/
Whatsapp: https://ift.tt/Zpdw7lj
Reddit: https://ift.tt/Ote7x39
Telegram: https://ift.tt/p3wD5ZU
NFT store: https://mintable.app/u/cha0smagick
Twitter: https://twitter.com/freakbizarro
Facebook: https://web.facebook.com/sectempleblogspotcom/
Discord: https://discord.gg/wKuknQA



Ignore tags:
#hacking,#infosec,#tutorial,#bugbounty,#threat,#hunting,#pentest,#hacked,#ethical,#hacker,#cyber,#learn,#security,#computer,#pc,#news

Comments