Hacking Cloud Infrastructure

Numbers of days 3
address 28 avenue George V 75008 Paris
Course in English
Price 4224€ VAT included

From build and migration to management and innovation, the pressure to secure cloud infrastructure is felt by all organisations. To do so effectively, you’ve got to understand the architecture of cloud attacks inside out – by using the tools and techniques yourself.
This course enables you to do just that. Get into the attacker mindset for 3 days and deploy over 25 fresh and novel attacks via our state-of-the-art labs. The training is delivered by professional penetration testers, well-versed in cloud hacking from their years of experience in the wild. At the end of the course, you’ll be able to confidently and competently identify weaknesses in cloud deployment. And by also covering cloud detection and response, you’ll be defence-ready, with the knowledge to fix those weaknesses and monitor your cloud environment for attacks. This course will be delivered in-person.


Course highlights: 

  • 3 days of hands-on cloud hacking, led by professional trainers experienced in real-world pentesting
  • A focus on new, novel, and advanced exploitation techniques across AWS, Microsoft Azure, and Google Cloud Platform (GCP)
  • An end-of-course capture the flag (CTF) to test your new skills
  • 30-day free access to the course labs after the class

Course details: 

  • In-person learning – 30% theory, 70% practical
  • Real-world-led theory sessions + technical challenges followed by trainer-led walkthrough
  • Includes a personal progress tracker to support learning at your own pace
  • Access to a custom Linux image, fully loaded with plugins, tools, and other features to help you identify and exploit vulnerabilities
  • Designed for practical application and to support studies for accreditations


The course Syllabus is as follows: 

Introduction to cloud computing 

  • Introduction to the cloud and why cloud security matters
  • Comparison with conventional security models
  • Shared responsibility model
  • Legalities around Cloud Pentesting
  • Attacking Cloud Services

Enumeration of cloud environments 

  • DNS-based enumeration
  • OSINT techniques for cloud-based asset identification
  • Username Enumeration


Azure Section: 

  • Introduction to Azure
  • Azure application attacks (App Service, Function App, Enterprise Apps)
  • Azure AD Authentication Methods

AWS Section Starts: 

  • AWS: Gaining Entry Via Exposed Services
  • Serverless-based attacks (AWS lambda)
  • PaaS Attack: SSRF Exploitation over AWS ElasticBeanStalk
  • Attacking AWS Incognito Misconfiguration
  • AWS: Identity and Access Management
  • AWS IAM Policies and Roles IAM Policy Evaluation
  • Roles and Permissions-Based Attacks
  • Shadow Admin Attacks

GCP Section Starts: 

  • Introduction to GCP IAM
  • Web Application Attacks
  • Lateral Movement Within GCP to Access Container Images

Attacking Storage Services (AWS, Azure, GCP):

  • Exploring files storage
  • Exploring SAS URLs in Azure
  • Exploit Misconfigured Storage Service

Containers as a service and K8s exploitation:

  • Understanding how container technology works (namespaces, cgroup, chroot)
  • From docker to Kubernetes
  • Identifying vulnerabilities in docker images
  • Exploiting misconfigured containers
  • Exploiting docker environments and breaking out of containers
  • Exploring Kubernetes (k8s) environments
  • K8s exploitation and breakouts
  • Pivoting to host OS


Top 3 Takeaways 

In this two-day course, students will develop an attackers mindset to attack the cloud environment after gaining the initial foothold. * Students will learn to attack and exploit a variety of Cloud infrastructure. They will play the part of the hacker, compromising serverless apps, cloud machines, storage and database services, dormant assets and resources. * Students will learn privilege escalation and pivoting techniques specific to cloud environments. * Students will learn how to breakout from the containers and escalate the privileges to get access to the host system.
The free 30-day lab access provides attendee surplus time to learn advanced topics in their own time and at their own pace.

Who Should Take This Course: 

  • Cloud Administrators
  • Developers
  • Solutions Architects
  • DevOps Engineers
  • SOC Analysts
  • Penetration Testers
  • Network Engineers
  • Security Enthusiasts

And anyone who wants to take their skills to the next level! Prior pentest experience is not a strict requirement; however, some knowledge of Cloud Services and familiarity with common command line syntax will be greatly beneficial.

What Students Should Bring: 

Students must bring their own laptop with: * Admin/root access * A virtualisation software (VirtualBox) pre-installed * 8 GB RAM and 20 GB free disk space dedicated (for Linux virtual image) * Minimum of 8 GB on the host system to support virtual image (preferable) </br> Note: Macbooks with M1 chips are not supported due to virtualization issues.


What Students Will Be Provided With: 

Numerous scripts and tools (some public and some NotSoPublic) will also be provided during the training, along with the student handouts. Our courses also come with detailed answer sheets. That is a step-by-step walkthrough of how every exercise within the class needs to be solved. These answer sheets are also provided to students at the end of the class.