Pivoting in Amazon Clouds

From no access at all, to the company Amazon's root account, this webcast will teach attendees about the components used in cloud applications like: EC2, SQS, IAM, RDS, meta-data, user-data, celery; and how misconfigurations in each can be abused to gain access to operating systems, database information, application source code, and Amazon's services through its API.

Provided by: SecurityTube.net Topic: Cloud Date Added: Nov 2014 Format: Webcast

Find By Topic