Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Modern Post Exploitation - The Ghost In The Cloud

Hack In The Box Security Conference via YouTube

Overview

This course explores the modern attacker mindset in utilizing weaknesses in IAM mechanisms in enterprise apps to achieve attacker goals post initial account compromise. The learning outcomes include understanding modern enterprise architectures, analyzing target apps, utilizing IAM gadgets for persistence, privilege escalation, and exfiltration, as well as evading security tools in this domain. The course teaches skills such as SCIM provisioning, ABAC automation, and analyzing app environments. The teaching method involves a talk with a real-world organization's reproduced environment demonstration. The intended audience includes cybersecurity professionals, AI researchers, and individuals interested in enterprise and identity security.

Syllabus

Intro
Once upon a time
SCIM provisioning
Real World Example
Automating access - ABAC
How to analyze a new app you need to target
Example analyzing GitHub
IAM Gadgets - Hiding access
IAM Gadgets - Exfiltration
Let's enumerate the access
Self Service to the rescue
Data links are free exfiltration tools
Takeaways

Taught by

Hack In The Box Security Conference

Reviews

Start your review of Modern Post Exploitation - The Ghost In The Cloud

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.