Attacking the Cloud Flashcards

1
Q

Most of the time, what is to blame for successful cloud attacks?

A

Compromised API-based credential material

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the primary attack vector for cloud environments?

A

Credential harvesting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is federated authenication?

A

Federated authentication is when organizational authentication uses Security Assertion Markup Language (SAML) to create an authentication token, which is then fed to a cloud service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a common Python tool that can be used to identify cloud resources, identify misconfigurations, and more in AWS? It can be used to conduct reconnaissance, privilege escalation, lateral movement, exploitation, and evasion in the cloud.

A

Pacu, developed by Rhino Security Labs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AWS user keys typically begin with ______ and services begin with ________.

A

AKIA, ASIA. When you see AKIA, it is a long-term credential and ASIA is a short-term credential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What term is used to describe someone gaining pervasive access to an account?

A

Account takeover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an example of a cloud-specific tool used for password spraying?

A

Microsoft Online MSOLSpray

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an example of a best-practice to ensure administrators only give people the permission they need to do their job while still being able to update permissions across all job holders should the requirement for the job change?

A

Rule-Based Access Control (RBAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Python tool that can audit accounts in AWS, Azure, Google Cloud, Alibaba, and Oracle Cloud, gathering configuration data and highlighting potential risk areas for manual inspection?

A

Scout Suite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is one of the most-abused cloud components?

A

Object Storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an open-source tool that uses YAML policy files for auditing and enforcing cloud configuration policies in multiple cloud environments such as Azure, AWS, and Google Cloud?

A

CloudCustodian

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a multi-cloud tool that helps identify target infrastructure, files, and applications using wordlists, domains, and common cloud naming conventions?

A

CloudBrute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What kind of cloud attack takes up bandwidth or connections to a target to create a DOS?

A

Volumetric DDoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

If the real IP address of a back-end server is revealed, attackers can bypass protections and attack IP addresses directly. What kind of attack is this called?

A

Direct-to-origin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Since the CPUs in cloud-hosted environments are the same and hardware can be shared across multiple customers, what kind of attack takes advantages of weaknesses in hardware to capture information from other instances?

A

Side-channel Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Name some tools that can be used for Infrastructure as Code.

A

Chef, Puppet, Ansible, SaltStack, Terraform, CloudFormation, Packer, Vagrant, Docker, Kubernetes

17
Q

What concept allows organizations to programmatically define how to build instances and architectures in the cloud so that they can be consistent, scalable, reusable, and well-defined?

A

Infrastructure as Code (IaS)