Posted on
in Presentations
Learn about CTF red-team techniques for AWS, Azure, and GCP related to discovery, compute instance compromise, temporary credential abuse, privilege escalation through role assumption, service accounts, service principals, code execution, container exploits, cached endpoint credentials. Preconfigured environments and example scripts will be provided.
Access This and Other RSAC™ Conference Presentations with Your Free RSAC Membership
Your RSAC™ Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.
Watch Now >>
Share With Your Community