Stealing the silver Lining from your cloud

BlackHat Webcast

06 May 2021

AI Generated Summary

AI Generated Content Disclaimer

Note: This summary is AI-generated and may contain inaccuracies, errors, or omissions. If you spot any issues, please contact the site owner for corrections. Errors or omissions are unintended.

This presentation, delivered as a Black Hat WebCast in 2021, provides a comprehensive overview of cloud security from an offensive perspective. Anant Shrivastava covers the current state of cloud adoption, the shared responsibility model, security tooling options, and then maps real-world cloud attack techniques to the MITRE ATT&CK framework — focusing on storage services, Azure blob exploitation, AWS Elastic Beanstalk SSRF chains, IAM privilege escalation via shadow admin accounts, and Cognito misconfigurations.

Key Topics Covered

Cloud Adoption Landscape:

Cloud Security Concerns:

Shared Responsibility Matrix:

Security Tooling in the Cloud:

Attack Techniques Mapped to MITRE ATT&CK:

AWS S3 and Azure Blob Storage Attacks:

AWS Elastic Beanstalk Attack Chain:

IAM Privilege Escalation — Shadow Admins:

AWS Cognito Misconfigurations:

Actionable Takeaways

  1. Map your organization’s cloud deployment model (IaaS through SaaS) against the shared responsibility matrix to identify exactly which security controls are your responsibility versus the provider’s.
  2. Combine native vendor security tools with third-party solutions for comprehensive coverage, especially in multi-cloud or hybrid environments where native tools lack cross-platform visibility.
  3. Target cloud storage services early in engagements — they are the foundational dependency for nearly all other cloud services and frequently contain secrets, source code, and sensitive data.
  4. Hunt for shadow admin accounts in AWS by auditing managed policies for dangerous permissions like iam:PutRolePolicy that enable privilege escalation without being members of obvious admin groups.
  5. Test AWS Cognito configurations for both unauthenticated and authenticated credential abuse, including hidden signup features that may grant unexpected access levels.
  6. Chain SSRF vulnerabilities with cloud metadata services and predictable resource naming patterns (Elastic Beanstalk, S3) to achieve full application compromise through CI/CD pipeline abuse.
  7. Audit Azure SAS URLs for overly permissive access scopes and validate that leaked storage keys are not present in public repositories.

Social chatter