Duração:
4 dias
Próxima Data:
18 a 21 Aug 2025
Local:
Online
Descrição
This 4-day course cuts through the mystery of Cloud Services (including AWS, Azure, and Google Cloud Platform) to uncover the vulnerabilities that lie beneath. We will cover a number of popular services and delve into both what makes them different, and what makes them the same, as compared to hacking and securing traditional network infrastructure. Whether you are an Architect, Developer, Pentester, Security or DevOps Engineer, or anyone with a need to understand and manage vulnerabilities in a Cloud environment, understanding relevant hacking techniques, and knowing how to protect yourself from them is critical. This course covers both the theory as well as a number of modern techniques that may be used to compromise various Cloud services and infrastructure. Prior pentest/security experience is not a strict requirement, however, some knowledge of Cloud Services and familiarity with common Unix command-line syntax will be beneficial.
*PVP por participante. A realização do curso nas datas apresentadas está sujeita a um quórum mínimo de inscrições.
Destinatários
- Cloud administrators and architect
- Penetration testers and red teamers
- CSIRT/SOC analysts and engineers/blue teams
- Developers
- Security/IT managers and team leads
-
Área: Cybersecurity
-
Certificação Associada: 156-406 – Check Point Certified PenTesting Expert – Cloud Security (CCPE-C)
Programa:
INTRODUCTION TO CLOUD COMPUTING
- Introduction to the cloud and why cloud security matters
- Comparison with conventional security models
- Shared responsibility model
- Legalities around Cloud Pentesting
- Attacking Cloud Services
ENUMERATION OF CLOUD ENVIRONMENTS
- DNS based enumeration
- Open-Source Intelligence Gathering (OSINT) techniques for cloud-based asset identification
- Username enumeration
ATTACK SURFACE OF CLOUD SERVICES
- Understanding Infrastructure as a Service (IaaS) Attack Surface
- Understanding Function as a Service (FaaS) Attack Surface
- Understanding Platform as a Service (PaaS) Attack Surface
- Understanding Container as a Service (CaaS) Attack Surface
ATTACKING CLOUD STORAGE
- Introduction to AWS S3
- AWS S3 Misconfigurations
- Introduction to GCP Storage
- Introduction to Azure Storage
- Azure: Shared Access Signature (SAS) URL Misconfiguration
ATTACKING MICROSOFT AZURE AD ENVIRONMENT
- Introduction to Azure and Microsoft Entra ID
- Azure Application Attacks on App Service, Function App, and Storages
- Azure Database
- Automation Account
- Azure Key Vault
- Introduction to Microsoft Entra ID Authentication Methods and Risks
- Microsoft Entra ID Attacks (Managed User Identities)
- Bypassing MFA Security and Conditional Access Policy
- Abusing Dynamic Membership Policy
- Azure Identity Protection to Monitor User Behaviour
ATTACKING AWS ENVIRONMENT
- Introduction to the AWS IAM Policies and Shadow Admin Permissions
- Understand AWS Policy Evaluation Logic
- IAM Misconfiguration (Identity Based Policy, and Resource Based Policy)
- Enumerate Roles using PACU
- Gaining Access to EC2 Instance by Abusing Instance Attribute
- PaaS Service exploitation and understand the pitfall of default permissions
- Attacking AWS Cognito misconfiguration
- Stealing sensitive information from ECR and ECS deployment
- Exploit Lambda and API Gateway
- Exploiting internal service using Virtual Private Cloud (VPC) misconfiguration (demo only)
- Introduction to AWS Organisation
- Understand Delegated administrator for AWS Organisations and, it’s risk
ATTACKING GCP ENVIRONMENT
- Introduction to GCP
- Introduction to IAM Role, Service account
- Understanding the Authentication in GCP
- Introduction to Compute Engine and Cloud Storage
- Understanding App Engine, IAP
- Database: Firestore/Firebase
- Cloud Function and Cloud Storage
- Pub/Sub and Cloud Run
- IAM Impersonation and Secret Manager
- Container Registry
REVISITING AWS, AZURE AND GCP MISCONFIGURATIO NS IN HARDENED ENVIRONMENT
- Microsoft Entra ID
- Azure MFA Bypass
- Azure Key Vault
- Elastic Beanstalk
- AWS IAM Misconfigurations
- ECS and ECR
- AWS Cognito
- GCP IAM
- GCP IAP
CLOUD DEFENCE USING OPEN- SOURCE AND CLOUD-NATIVE TOOLS
- Identification of Cloud Assets
- Hybrid Account Asset Inventory
- AWS Multi-Account Asset Inventory using Open Source Tools
- Protection of Cloud Assets
- Principle of Least Privilege (with examples like EC2, IAM, RDS, etc.)
- Financial Protections by Enabling Budgets
- Metadata API Protection
- Demo of Metadata API Protection using Linux Firewall Rules
- Monitoring Cloud Activities using Cloud Native Tools
- Hybrid Cloud Account Monitoring Strategy
- Automated Response in Cloud Against Malicious Activities
- Response to Attacks Using AWS Config
CLOUD AUDITING AND BENCHMARKING
- Preparing for the audit
- Automated auditing via tools
- Golden image/Docker image audits
- Windows Infrastructure as a Service (IaaS) auditing
- Linux IaaS auditing
- Relevant benchmarks for cloud
CAPTURE THE FLAG
- A timed competition to test your new skills and reinforce everything you’ve learnt
Pré-requisitos:
Delegates must have the following to make the most of the course:
• Basic to intermediate knowledge of cybersecurity (1.5+ years’ experience) • Experience with common command line syntax
Partilha: