9E: Cloud-Based Attacks Flashcards

3.4 Given a scenario, research attack vectors and perform attacks on cloud technologies.

1
Q

In this attack, a malicious actor injects malicious code into an application. Common attacks can include SQL injection (SQLi) and Cross Site Scripting (XSS). In addition, the service can fall victim to a wrapper attack, which wraps and conceals malicious code, in order to bypass standard security methods

A

Malware Injection Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Also called a sidebar or implementation attack, this exploit is possible because of the shared nature of the cloud infrastructure, especially in a PaaS model. In this attack, the hardware leaks sensitive information such as cryptographic keys, via a covert channel, to a potential attacker.

A

Side-Channel Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Many organizations seek to reduce the threat of a DDoS attack by using methods such as reverse proxies in front of the web servers. This insulates the servers from a possible attack as the malicious actor is unable to penetrate the defenses. However, in a D2O attack, malicious actors circumvent this protection by identifying the origin network or IP address, and then launching a direct attack.

A

Direct-to-origin Attacks (D2O)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An open-source tool written in Python that can be used to audit instances and policies created on multicloud platforms, such as AWS, Microsoft Azure, and Google Cloud.

A

ScoutSuite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An audit tool for use with Amazon Web Services only.

A

Prowler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This tool is designed as an exploitation framework to assess the security configuration of an AWS account.

A

Pacu

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An open-source cloud security, governance, and management tool designed to help the administrator create policies based on resource types.

A

Cloud Custodian

How well did you know this?
1
Not at all
2
3
4
5
Perfectly