Detection Opportunities

How A Compromised AWS Lambda Function Led to a Phishing Attack | EP. 1


Listen Later

In this video, I’ll be going over detection opportunities at various stages of cloud security attacks.


Compromised Cloud Compute Credentials: Case Studies From the Wild


_____________

TIMESTAMPS

00:00 Intro

00:40 The Attack Case

02:12 The Attack Graph

02:44 The Attack Flow

03:06 Detection Opportunity 1: Enumeration/Reconnaissance/Discovery - Cloud Infrastructure Discovery

05:27 Detection Opportunity 2: Persistence - Create Cloud Account

08:19 Detection Opportunity 3: Impact - Resource Hijacking

09:54 Detection Opportunity 4: Defense Evasion - Indicator Removal

10:23 Detection Opportunity 5: Credential Access - Stealing an application access token

12:04: Conclusion



_____________

⚡️JOIN 6,000+ CWX MEMBERS ON DISCORD

📰 SUBSCRIBE TO THE CYBERWOX UNPLUGGED NEWSLETTER

🥶 CYBERWOX MERCH



_____________

🧬 CYBERWOX RESOURCES

🔹 Cyberwox Cybersecurity Notion Templates for planning your career

🔹 Cyberwox Best Entry-Level Cybersecurity Resume Template

🔹 Learn AWS Threat Detection with my LinkedIn Learning Course



_____________

📱 LET'S CONNECT

⁠⁠IG⁠⁠

⁠⁠Threads⁠⁠

⁠⁠Substack⁠⁠

⁠⁠Twitter⁠⁠

⁠⁠Linkedin⁠⁠

⁠⁠Tiktok⁠⁠

Email: [email protected]



_____________

⚠️DISCLAIMER

This description has some affiliate links, and I may receive a small commission for purchases made through these links. I appreciate your support!


Email: [email protected]

...more
View all episodesView all episodes
Download on the App Store

Detection OpportunitiesBy CYBERWOX