Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn advanced AWS attacker techniques focused on establishing and maintaining persistence within cloud environments through this 28-minute conference talk from BSidesMunich. Explore the dual nature of persistence mechanisms in AWS infrastructure, examining both the advantages they provide to legitimate operations and the significant security risks they pose when exploited by malicious actors. Discover specific attack vectors that threat actors use to maintain long-term access to AWS accounts and resources, including techniques for evading detection and surviving common security remediation efforts. Gain insights into the methods attackers employ to establish backdoors, create shadow administrative access, and leverage AWS services for persistent access that can survive credential rotations and security audits. Understand the defensive implications of these techniques and develop strategies to identify, prevent, and remediate persistence-based attacks in your AWS environment.
Syllabus
The Perks And Perils Of Persistence: AWS Attacker Techniques - Oisin B
Taught by
BSidesMunich