Attacking the Cloud Flashcards
Most of the time, what is to blame for successful cloud attacks?
Compromised API-based credential material
What is the primary attack vector for cloud environments?
Credential harvesting
What is federated authenication?
Federated authentication is when organizational authentication uses Security Assertion Markup Language (SAML) to create an authentication token, which is then fed to a cloud service.
What is a common Python tool that can be used to identify cloud resources, identify misconfigurations, and more in AWS? It can be used to conduct reconnaissance, privilege escalation, lateral movement, exploitation, and evasion in the cloud.
Pacu, developed by Rhino Security Labs
AWS user keys typically begin with ______ and services begin with ________.
AKIA, ASIA. When you see AKIA, it is a long-term credential and ASIA is a short-term credential
What term is used to describe someone gaining pervasive access to an account?
Account takeover
What is an example of a cloud-specific tool used for password spraying?
Microsoft Online MSOLSpray
What is an example of a best-practice to ensure administrators only give people the permission they need to do their job while still being able to update permissions across all job holders should the requirement for the job change?
Rule-Based Access Control (RBAC)
What is a Python tool that can audit accounts in AWS, Azure, Google Cloud, Alibaba, and Oracle Cloud, gathering configuration data and highlighting potential risk areas for manual inspection?
Scout Suite
What is one of the most-abused cloud components?
Object Storage
What is an open-source tool that uses YAML policy files for auditing and enforcing cloud configuration policies in multiple cloud environments such as Azure, AWS, and Google Cloud?
CloudCustodian
What is a multi-cloud tool that helps identify target infrastructure, files, and applications using wordlists, domains, and common cloud naming conventions?
CloudBrute
What kind of cloud attack takes up bandwidth or connections to a target to create a DOS?
Volumetric DDoS
If the real IP address of a back-end server is revealed, attackers can bypass protections and attack IP addresses directly. What kind of attack is this called?
Direct-to-origin
Since the CPUs in cloud-hosted environments are the same and hardware can be shared across multiple customers, what kind of attack takes advantages of weaknesses in hardware to capture information from other instances?
Side-channel Attack