Pivoting in Amazon Clouds

Provided by: SecurityTube.net
Topic: Cloud
Format: Webcast
From no access at all, to the company Amazon's root account, this webcast will teach attendees about the components used in cloud applications like: EC2, SQS, IAM, RDS, meta-data, user-data, celery; and how misconfigurations in each can be abused to gain access to operating systems, database information, application source code, and Amazon's services through its API.

Find By Topic