Privilege Escalation and Persistence in AWS


Posted on in Presentations

How does an attacker escalate privileges and gain persistence in AWS? Participants will learn multiple red team techniques and apply them against live AWS accounts. Participants will also learn mitigation, detection, and remediation strategies to defend against these techniques. We will provide participants the tools to apply this knowledge within their own organizations. This session will follow Chatham House Rule to allow for free exchange of information and learning. We look forward to participants actively engaging in the discussion and remind attendees that no comment attribution or recording of any sort should take place. This is a capacity-controlled session. If added to your schedule and your availability changes, please remove this session from your schedule to allow others to participate.

Attendees are required to bring their own laptop to the session.

Participants
Raymond Canzanese

Facilitator

Research Director, Netskope

Jenko Hwong

Facilitator

Cloud Security Researcher, Netskope

Cloud Security Technology Infrastructure & Operations

cloud security hackers & threats penetration testing misconfiguration persistence


Topic

Subtopic


Share With Your Community