Research presented at SaintCon in Utah on October 26th 2022.
Session Name: "Cloud Focused Continuous Red Teaming: Avoiding the Fall of Icarus!"
Red Teaming and Penetration Testing of Cloud (AWS, Azure, GCP, etc.) environments is a rapidly evolving field. Every year new tools are being released and existing techniques are being further refined. This session covers the latest Cloud focused attack vectors and describes viable strategies on how to detect their malicious usage within your cloud environments.
Some of the topics covered include:
- How attackers go from zero to (Cloud) Admin
- Stealing of SSO Tokens and Browser Cookies to Bypass EDRs & go directly to Cloud Services
- Leverage Graph Database Technologies (e.g. Neo4j) to Discover Privilege Escalation Paths
- Methods for Bridging Cloud Environments to On-Premise Networks & Information Systems
- Techniques to Attack These Bridges & Methods to Persist For The Long Haul
Next, we will show how organizations can easily take their cybersecurity programs to the next-level via implementing a simple but effective Continuous Red Teaming program. With this rapidly evolving cloud focused threat landscape, and the endlessly sprawl of cloud resources, organizations are being forced to take a critical look at their security backlog of work, including the prioritization of remediating all of the known vulnerabilities. In addition, the limited availability of qualified human resources and competing business concerns (e.g. new features vs bug fixes) add additional strain on security, engineering and IT personnel to demonstrate the value add of closing common security issues (e.g. via path management programs, etc.). Continuous Testing programs enable organizations to focus on closing out the issues within their security backlog which will have the greatest Return on Investment (ROI) to an organization’s security posture.
Cloud expertise is not required since the presentation covers the basics of how Cloud environments are commonly implemented, while then highlighting the areas that are most useful for attackers. Information presented is useful for both Red Team & Blue Team members.