Cloud Hacking icon

Cloud Hacking

A two-day training course on hacking and securing cloud infrastructures.

Contact

This two-day course unravels the mystery of cloud services (including AWS, Azure and Google Cloud Platform) and uncovers the underlying vulnerabilities. We will address a number of popular services and explore the differences and similarities in terms of hacking and securing a traditional network infrastructure.

The course is now available as live online training and can be held for you individually or for your company. Contact us below with your requirements.

For security and IT decision-makers

What impact does a training course by Claranet Cyber Security really have on your team?

Reveal and harden your company’s cloud attack surface by building a team that can test, identify and guide developers to address – and further prevent – the occurrence of cloud-based vulnerabilities and misconfigurations. At the end of the course, participants will be able to:

  • Perform tests to identify and exploit complex vulnerabilities and security misconfigurations in AWS, Microsoft Azure and Google Cloud Platform (GCP),
  • Design tests based on real-world attacker behaviour and tools to make them relevant for the threats your company faces,
  • Identify attack surfaces created by cloud-based services such as virtual machines (VMs), buckets, Container-as-a-Service (CaaS) platforms and serverless functions,
  • Exploit, defend and review containerisation environments,
  • Be instrumental in planning cloud defence strategies, patching, inventory management and other security checks,
  • Recommend and assist in the implementation of cloud-based attack detection and response tactics,
  • Understand the commercial impact of web vulnerabilities and present this to key stakeholders,
  • Take on more responsibility in the team,
  • Become an advocate for security throughout the company.
  • Overview
  • Details
  • Requirements and participant profile
  • Download the brochure

An understanding of the relevant hacking techniques and how to protect yourself against them is essential, whether you are an architect, developer, pentester, security or DevOps engineer, or someone who needs to understand and manage vulnerabilities in a cloud environment. This course covers both the theory as well as a range of modern techniques that can be used to compromise various cloud services and infrastructures.

Introduction to Cloud Computing

  • What is cloud and Why it matters
  • Types of clouds and cloud services
  • What changes from conventional security models
  • Shared responsibility model (pizza as a service v2.0)

Attacking Cloud Services

  • Conventional vs Cloud Infra Assessment
  • Legalities around Cloud Pentesting
  • How to approach Pentesting cloud services
  • Understanding Metadata API
  • Understand the attack surface in each type of cloud
  • Enumerating for cloud assets

Gaining Entry in Cloud Environment

  • Lambda attacks
  • Web application Attacks
  • Exposed Service ports

Attacking Specific Cloud Surfaces

  • Storage Attacks
  • Azure AD Attacks
  • Financial Attacks
  • IAM Attacks : Shadow admins
  • Dormant assets
  • Google Dorking in Cloud Era

Post - Exploitation

  • Maintain access after the initial attack
  • Post access asset enumeration
  • Extracting secrets from Snapshot access

Defending the Cloud Environment

  • Setting up Monitoring and logging of the environment
  • Catching attacks using monitoring and logging
  • Metadata API Protection

Host Base Defences for IAAS

  • Windows server auditing
  • Linux Server Auditing

Auditing and Bench-Marking of Cloud

  • Prepare the environment for the audit
  • Automated auditing using open source tools
  • Golden Image / Docker image audits
  • Relevant Benchmarks for cloud
  • Continuous inventory monitoring
  • Continuous monitoring to Detect changes in cloud environment

Who Should Take This Class?

Cloud Administrators, Developers, Solutions Architects, DevOps Engineers, SOC Analysts, Pen Testers, Network Engineers, security enthusiasts and anyone who wants to take their skills to next level.

Prior pen testing experience is not a strict requirement, however, some knowledge of Cloud Services and common command line syntax will be greatly beneficial.

You will need:

Delegates must bring their own laptop and have admin/root access on it. The laptop must have a virtualization software (virtualbox / VMWare) pre installed. A customized version of Kali Linux (ova format) containing custom tools, scripts and VPN scripts for the class will be provided to the students. The laptop should have at least 4 GB RAM and 20 GB of free disk space dedicated for the VM.

Download

Course Information