Hacking and Securing Cloud Infrastructure
You will be able to:
- Learn how to tackle cloud security issues for AWS, Azure and Google Cloud Platform in theory and in practice
- Understand complex vulnerabilities within the Cloud environment and learn how to effectively secure them.
- Enumerate cloud assets and gain entry into a cloud environment
- Learn how to prepare for Auditing and audit the data plane and golden images, AMI and Docker images
You will receive:
Access to our Hack-Lab is not just for your work during the course, you will have access for 30 days after the course too. This gives you plenty of time to practice the concepts taught during the course. The Hack-Lab contains a wide variety of challenges. Numerous scripts, a custom build Linux Distribution with new developer tools will also be provided during the course, along with Delegate handouts.
Who Should Take This Class?
Cloud Administrators, Developers, Solutions Architects, DevOps Engineers, SOC Analysts, Pen Testers, Network Engineers, security enthusiasts and anyone who wants to take their skills to next level.
Prior pen testing experience is not a strict requirement, however, some knowledge of Cloud Services and common command line syntax will be greatly beneficial.
Details of the course content:
INTRODUCTION TO CLOUD COMPUTING
- Introduction to cloud and why cloud security matters
- Comparison with conventional security models
- Shared responsibility model
- Legalities around Cloud Pentesting
- Attacking Cloud Services
ENUMERATION OF CLOUD ENVIRONMENTS
- DNS based enumeration
- OSINT techniques for cloud-based asset
GAINING ENTRY VIA EXPOSED SERVICES
- Serverless based attacks (AWS Lambda / Azure & Google functions)
- Web application Attacks
- SSRF Exploitation over AWS ElasticBeanStalk
- Exploiting vulnerable applications over GCP and Azure
ATTACKING STORAGE SERVICES (AWS, AZURE, GCP)
- Exploring files in storage
- Exploring SAS URL's in Azure
- Achieving privilege elevation via secrets in Storage
- Remote code Execution via storage in PaaS, FaaS environment
ATTACKING AZURE AD ENVIRONMENT
- Enumeration in Azure AD
- Various Azure Services
- Azure Service exploitation
- Stealing secrets from Azure services
IAM MISCONFIGURATION ATTACKS
- Exploiting Shadow admins in AWS and Azure
- Attacking AWS Incognito misconfigurations
EXPLOITING PLATFORM AS A SERVICE ENVIRONMENTS (AWS BEANSTALK AND OTHERS) POST – EXPLOITATION
- Persistence in Cloud
- Post exploit enumeration
- Snapshot access
- Backdooring the account
CONTAINERS AS A SERVICE AND K8S EXPLOITATION
- Understanding how container technology work (namespaces, cgroup, chroot)
- From docker to kubernetes
- Identifying vulnerabilities in docker images
- Exploiting misconfigured containers
- Exploiting docker environments and breaking out of containers
- Exploring kubernetes (k8s) environments
- K8s exploitation and breakouts
- Pivoting to host OS
DEFENDING CONTAINERS
- Container Image security basics
- Container Host security
DEFENDING K8S
- Authentication Methods and Configuration
- Native Authorization and Third Party Solutions
- Cluster Network Protections
- Monitoring K8s Environments
DEFENDING THE CLOUD ENVIRONMENT
- Identification of cloud assets
- Inventory Extraction for AWS, Azure and GCP
- Continuous inventory management
- Protection of Cloud Assets
- Principle of least privilege
- Control Panel and Data Panel Protection
- Financial Protections
- Cloud specific Protections
- Metadata API Protection
- Detection of Security issues
- Setting up Monitoring and logging of the environment
- Identifying attack patterns from logs
- Revisiting day 1 attacks via logs
- Real time monitoring of logs
- Monitoring in multi-cloud environment
- Response to Attacks
- Automated Defense techniques
- Cloud Defense Utilities
- Validation of Setup
AUDITING AND BENCHMARKING OF CLOUD
- Preparing for the audit
- Automated auditing via tools
- Golden Image / Docker image audits
- Auditing Kubernetes Environments using Opensource tools
- Windows IaaS auditing
- Linux IaaS Auditing
- Relevant Benchmarks for cloud
CTF to reinforce learning
Sorry! It looks like we haven’t updated our dates for the class you selected yet. There’s a quick way to find out. Contact us at 502.265.3057 or email info@training4it.com
Request a Date