Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Exploiting Cloud Provider Vulnerabilities for Initial Access in AWS

Black Hat via YouTube

Overview

Coursera Plus Annual Sale: All Certificates & Courses 25% Off!
Explore a Black Hat conference talk that delves into critical vulnerabilities within Amazon Web Services (AWS) products that enabled unauthorized access to cloud environments. Learn how IAM roles establish trust with AWS services and discover a vulnerability that bypassed protective mechanisms. Examine a real-world confused deputy vulnerability in AWS AppSync that allowed IAM role hijacking across accounts. Understand potential misconfigurations in IAM roles using sts:AssumeRoleWithWebIdentity that could enable unauthorized global access without authentication, affecting Amazon Cognito, GitHub Actions, and other services. Investigate a vulnerability in AWS Amplify that exposed customer IAM roles to takeover, providing unauthorized access to victim accounts. Gain insights into securing cloud environments against zero-day vulnerabilities and learn how attackers identify and exploit AWS service vulnerabilities for initial access.

Syllabus

Kicking in the Door to the Cloud: Exploiting Cloud Provider Vulnerabilities for Initial Access

Taught by

Black Hat

Reviews

Start your review of Exploiting Cloud Provider Vulnerabilities for Initial Access in AWS

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.