Advanced Discovery, Persistence and Privilege Escalation in AWS, GCP, Azure


Posted on in Presentations

How do attackers maintain stealth, escalate privileges, and gain persistence in AWS, GCP, or Azure? Learn new red team techniques such as unlogged enumeration, hiding credentials and serverless function, and cloud shell backdoors. Apply techniques against live AWS, GCP, and Azure environments and then learn mitigation, detection, and remediation strategies to secure the environment.
Participants
Colin Estep

Facilitator

Principal Security Researcher, Netskope

Jenko Hwong

Facilitator

Principal Security Researcher, Netskope


Share With Your Community