All the things are and/or will be on AWS now, but the public state of the art AWS hacking techniques are some combination of 1. Search Github for access keys, 2. Start up EC2 instances and mine Bitcoin. That’s not at all realistic.
The talk will be presented as a guide on how to hack an AWS account start to finish:
- External reconnaissance and target selection
- Initial compromise and trust abuse
- Log disruption
- Exploration and exfiltration
- Privilege escalation and lateral movement
- Other things