AWS is the world’s most commonly used and subsequently most attacked cloud provider. Understanding how developers in your company use AWS, how cloud infrastructure is likely deployed in your company, what default configurations are a security problem and how business priorities of your company will end up introducing the most easy to abuse security flaws is important if you want to get a handle on AWS security.
We will learn this through this hands-on training which will attempt to take you on a journey as an attacker, focused on breaking apps and servers in AWS through various interactive and hands-on scenario-driven labs.
Following section lists the topics that will be covered. Topics will be hands-on with full documentation.
As Cloud Security professionals, we will get familiar with the AWS cloud console, and use the AWS CloudShell to set up a vulnerable AWS cloud environment.
This scenario will take the participants through multiple misconfigurations in AWS IAM, how we can audit IAM to find these misconfigurations, exploit them to elevate privileges and fix these issues to secure AWS.
This scenario will cover attacking the AWS S3 service, understanding how business requirements and developer needs result in poor configurations that are insecure. We will learn about implementing some defensive controls that enhances AWS S3 security.
This scenario will cover misconfigurations in various EC2 services that are often created as a result of developers wanting to ship fast. We will exploit EC2 and see how the service can be made secure.
This scenario will abuse misconfigurations in RDS arising from developers using legacy techniques to reach databases. The misconfigurations will be detected, exploited and fixed to understand the attacker mindset and what developers can do to stay secure.
Attacks and defenses on EKS, privilege escalation, token stealing and data stealing. Attacks and defense on serverless Lambda and understanding code changes that would enhance security of the system.
We will take a look at some of the common defensive services available in AWS including and understand why these are expensive and difficult to use by developers and users alike.
We will end the training with a fun Capture the Flag to hack systems, find flags and race to the finish line! Documentation for the CTF will be made available as part of the training after the training.
The pre-requisites are very minimal. The way our training is designed, a basic understanding of the following concepts can get you up and running through the exercises in no time:
This is a hands-on class. The following requirements need to be met to gain maximum value from the class:
The training is meant to be hands-on for beginners with AWS Security. Prior knowledge of AWS services is recommended but not mandatory. The training will cover basics to a few advanced concepts to ensure you truly go from Zero to Hero