Section 12: Cloud Attacks Flashcards

1
Q

Direct-To-Origin (D2O) Attack

A

Attempts to bypass reverse proxies to directly attack the original network or IP address of the cloud-based server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Account Takeover

A

Attackers silently embed themselves within an organization to slowly gain additional access or infiltrate new organizations

Account takeovers are very hard to detect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Vertical vs Horizontal Privilege Escalation

A

Vertical
o User to admin/root account

Horizontal
o User to another user account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cloud Object Storage

A

▪ Bucket
● Amazon Web Services
▪ Blob
● Microsoft Azure
▪ An object is the equivalent of a file, and a container is the folder
▪ Object ACLs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Software Development Kit (SDK)

A

A package of tools dedicated to a specific programming language or platform commonly used by developers when creating apps

▪ SDKs can contain vulnerabilities if the author who built those functions didn’t do a good job

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Scoutsuite

A

An open-source tool written in Python that can be used to audit instances and policies created on multicloud platforms by collecting data using API calls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Prowler

A

An open-source security tool used for security best practices
assessments, audits, incident response, continuous monitoring,
hardening, and forensics readiness for AWS cloud services

Prowler is a command-line tool that can create a report in HTML, CSV, and JSON formats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Pacu

A

Anexploitation/post exploitation framework used to assess the security configuration of an Amazon Web Services (AWS) account

Similar to Metasploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CloudBrute

A

Used to find a target’s infrastructure, files, and apps across the top cloud service providers, including Amazon, Google, Microsoft, DigitalOcean,Alibaba, Vultr, and Linode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cloud Custodian

A

▪ An open-source cloud security, governance, and management tool designed to help admins create policies based on different resource types
▪ Cloud Custodian is a stateless rules engine used to manage AWS
environments by validating and enforcing the environment against set standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly