Advanced Discovery, Persistence and Privilege Escalation in AWS, GCP, Azure


Posted on in Presentations

How do attackers maintain stealth, escalate privileges, and gain persistence in AWS, GCP, or Azure? Learn new red team techniques such as unlogged enumeration, hiding credentials and serverless function, and cloud shell backdoors. Apply techniques against live AWS, GCP, and Azure environments and then learn mitigation, detection, and remediation strategies to secure the environment.

Join the RSAC Membership to unlock AI-powered summaries, mind maps, and slides for this and other RSAC Conference presentations. Learn more.

Participants
Colin Estep

Facilitator

Principal Security Researcher, Netskope

Jenko Hwong

Facilitator

Principal Security Researcher, Netskope


Share With Your Community