Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

whoAMI - Discovering and Exploiting a Large-Scale AMI Name Confusion Attack

fwd:cloudsec via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore a groundbreaking cloud security vulnerability through this 39-minute conference talk that reveals the whoAMI attack, a technique enabling remote code execution across thousands of AWS accounts simultaneously. Learn how security researcher Seth Art from Datadog uncovered this large-scale AMI name confusion attack by examining a known misconfiguration through an innovative perspective. Discover the research methodology used to identify how thousands of AWS accounts unknowingly employ insecure patterns when retrieving AMI IDs, including vulnerable systems internal to AWS itself. Examine the diverse ways developers inadvertently create security vulnerabilities by omitting the owners attribute in their AMI configurations. Understand the challenges involved in building and refining detection mechanisms for this anti-pattern while minimizing both false positives and false negatives. Gain practical knowledge on identifying and remediation strategies for this misconfiguration in your own AWS environment, including comprehensive defense-in-depth approaches for both prevention and detection. Follow this detailed account of cloud security research that demonstrates the complexity and persistence required in modern cybersecurity investigations.

Syllabus

whoAMI: Discovering and exploiting a large-scale AMI name confusion attack

Taught by

fwd:cloudsec

Reviews

Start your review of whoAMI - Discovering and Exploiting a Large-Scale AMI Name Confusion Attack

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.