Scroll Top

Hacking and Securing Cloud Infrastructure

Course Description

This 3-day course cuts through the mystery of Cloud Services (including AWS, Azure and G-Cloud) to uncover the vulnerabilities that lie beneath. We will cover a number of popular services and delve into both what makes them different, and what makes them the same, as compared to hacking and securing a traditional network infrastructure. Whether you are an Architect, Developer, Pentester, Security or DevOps Engineer, or anyone with a need to understand and manage vulnerabilities in a Cloud environment, understanding relevant hacking techniques, and how to protect yourself from them, is critical.

This class covers both the theory a well as a number of modern techniques that may be used to compromise various Cloud services and infrastructure

Course contents

Whether you are an Architect, Developer, Pentester, Security or DevOps Engineer, or anyone with a need to understand and manage vulnerabilities in a Cloud environment, understanding relevant hacking techniques, and how to protect yourself from them, is critical. This class covers both the theory a well as a number of modern techniques that may be used to compromise various Cloud services and infrastructure

Prior pentest/security experience is not a strict requirement, however, some knowledge of Cloud Services and familiarity with common Unix command-line syntax will be beneficial.

INTRODUCTION TO CLOUD COMPUTING

  • Introduction to cloud and why cloud security matters
  • Comparison with conventional security models
  • Shared responsibility model
  • Legalities around Cloud Pentesting
  • Attacking Cloud Services

ENUMERATION OF CLOUD ENVIRONMENTS

  • DNS based enumeration
  • OSINT techniques for cloud based asset

GAINING ENTRY VIA EXPOSED SERVICES

  • Serverless based attacks (AWS Lambda / Azure & Google functions)
  • Web application Attacks

ATTACKING SPECIFIC CLOUD SERVICES

  • Storage Attacks
  • Azure AD Attacks
  • IAM Misconfiguration Attacks
  • Roles and permissions based attacks
  • Attacking Incognito misconfigurations

EXPLOITING KUBERNETES CLUSTERS AND CONTAINER AS A SERVICE

  • Understanding how container technology works
  • Exploiting docker environments and breaking out of containers
  • K8s exploitation and breakouts
  • Exploiting misconfigured containers

POST – EXPLOITATION

  • Persistence in Cloud
  • Post exploit enumeration
  • Snapshot access
  • Backdooring the account

AUDITING AND BENCHMARKING OF CLOUD

  • Preparing for the audit
  • Automated auditing via tools
  • IaaS Auditing Windows and *nix Environments
  • Golden Image / Docker image audits
  • Relevant Benchmarks for cloud

DEFENDING THE CLOUD ENVIRONMENT

  • Identification of cloud assets (AWS, Azure and GCP)
  • Protection of Cloud Assets
  • Principle of least privilege
  • Control Plane and Data Plane Protection
  • Metadata API Protection

DETECTION OF SECURITY ISSUES

  • Setting up Monitoring and logging of the environment
  • Identifying attack patterns from logs *
  • Real time monitoring of logs *

RESPONSE TO ATTACKS

  • Automated Defense techniques
  • Cloud Defense Utilities
  • Validation of Setup

PURPLE TEAMING WHERE RED AND BLUE EXCHANGE NOTES

CTF TO REINFORCE LEARNING

*Demo will be shown by the instructor, Lab time will be provided if time permits. Extended Lab access will be available for 30 days after the class.

Key Takeaways

Students will gain knowledge of attacking, exploiting and defending a variety of Cloud infrastructure. First, they will play the part of the hacker, compromising serverless apps, cloud machines, storage and database services, dormant assets and resources. Students will learn privilege escalation and pivoting techniques specific to cloud environments. This is followed by Infrastructure Defense, secure configuration, auditing, logging, benchmarks.

Students will learn preventive measures against cloud attacks, host-based defense and a number of cloud tools that can help in securing their services and resources. Apply the learning to:

Apply the learning to:

  • Identify weaknesses in cloud deployment
  • Fix the weaknesses in your cloud deployment
  • Monitor your cloud environment for attacks

Target audience

Cloud Administrators, Developers, Solutions Architects, DevOps Engineers, SOC Analysts, Penetration Testers, Network Engineers, security enthusiasts and anyone who wants to take their skills to next level

Student requirements

Delegates must bring their own laptop and have admin/root access on it. The laptop must have a virtualization software (virtualbox / VMWare) pre installed. A customized version of Kali
Linux (ova format) containing custom tools, scripts and VPN scripts for the class will be provided to the students. The laptop should have at least 4 GB RAM and 20 GB of free disk space
dedicated for the VM.

What students will be provided with

Our own customized version of kali linux with inhouse developed scripts and tools to help with hacking auditing and securing Cloud

Trainer Biography

Anthony Webb is proud to have been a committed tech geek ever since first learning to code on a BBC Micro at around 6 years old. He has worked in Information Security specifically for the past 6 years and specializes in Infrastructure Security, Cloud Security, Penetration Testing and Red Teaming. Anthony works as an Associate Director with NotSoSecure and holds industry recognized accreditations including OSCP, QSTM/CTM, CREST CRT as well as a number of
AWS certifications including Security – Specialty, Solutions Architect and Developer Associate. He is a trainer for a number of NotSoSecure’s hacking courses ranging from introductory through to advanced and specialist. He is a lead trainer for both the Advanced Infrastructure Hacking (AIH) and Hacking and Defending Cloud courses. Anthony has delivered training at a number of conferences including BlackHat conferences globally, CPX360, BruCON, OWASP AppSec Day, as well as many smaller classroom and in-house groups and live web-based training delivery.

Social media

Privacy Preferences
When you visit our website, it may store information through your browser from specific services, usually in form of cookies. Here you can change your privacy preferences. Please note that blocking some types of cookies may impact your experience on our website and the services we offer.