CloudSec Wine – Telegram
CloudSec Wine
2.14K subscribers
919 photos
18 files
1.26K links
All about cloud security

Contacts:
@AMark0f
@dvyakimov

About DevSecOps:
@sec_devops
Download Telegram
🔶🔷🔴 Hijacking Cloud CI/CD Systems for Fun and Profit

This research details a new technique that can be used by threat actors for supply chain attacks on open-source repositories using GCP, Azure and AWS.

https://divyanshu-mehta.gitbook.io/researchs/hijacking-cloud-ci-cd-systems-for-fun-and-profit

#aws #azure #gcp
🔥31👍1👏1
🔶AWS Networking Concepts

A mind map to link together all the different networking-related concepts from AWS.

https://miparnisariblog.wordpress.com/2023/03/29/aws-networking-concepts/

#aws
👍4🔥2👏1
🔶 Automated First-Response in AWS using Sigma and Athena

Can Sigma rules provide first-response capabilities in a post-compromised AWS environment?

https://invictus-ir.medium.com/automated-first-response-in-aws-using-sigma-and-athena-615940bedc56

(Use VPN to open from Russia)

#aws
👍4🔥3👏1
🔷 Microsoft Entra Workload ID - Introduction and Delegated Permissions

Post providing an overview about some aspects and features which are important in delegating management of Workload ID in Microsoft Entra: Who can see and create apps? Why you should avoid assigning owners to service principals or application objects?

https://www.cloud-architekt.net/entra-workload-id-introduction-and-delegation

#azure
👍4🔥1😱1
🔶 More on Abusing the Amazon Web Services SSM Agent as a Remote Access Trojan

This blog lays out a new potential post-exploitation technique: Abusing AWS Systems Manager (SSM) agent so that it functions as a Remote Access Trojan (RAT) on both Linux and Windows machines, while using an attacker AWS account as a Command and Control (C&C).

https://www.mitiga.io/blog/abusing-the-amazon-web-services-ssm-agent-as-a-remote-access-trojan

#aws
👍3🔥2👏1
🔴 Signing URLs in GCP: Convenience vs. Security

Why the "iam.serviceAccounts.signBlob" permission can cause trouble in your GCP environment.

https://lsgeurope.com/post/signing-urls-in-gcp-convenience-vs-security

#gcp
👍3🔥1👏1
🔶 Perform continuous vulnerability scanning of AWS Lambda functions with Amazon Inspector

Activate Amazon Inspector within one or more AWS accounts, and be notified when a vulnerability is detected in an AWS Lambda function.

https://aws.amazon.com/ru/blogs/security/perform-continuous-vulnerability-scanning-of-aws-lambda-functions-with-amazon-inspector/

#aws
👍4🔥21
🔶 Configure fine-grained access to your resources shared using AWS Resource Access Manager

You can use AWS Resource Access Manager (AWS RAM) to securely, simply, and consistently share supported resource types within your organization or organizational units (OUs) and across AWS accounts.

https://aws.amazon.com/ru/blogs/security/configure-fine-grained-access-to-your-resources-shared-using-aws-resource-access-manager/

#aws
👍31🔥1
🔷 Unauthorized Access to Cross-Tenant Applications in Microsoft Power Platform

A researcher at Tenable has discovered an issue that enables limited, unauthorized access to cross-tenant applications and sensitive data (including but not limited to authentication secrets).

https://www.tenable.com/security/research/tra-2023-25

(Use VPN to open from Russia)

#azure
1👍1🔥1
🔷 Knocking on the Front Door (client side desync attack on Azure CDN)

A write-up on a Browser-Powered Desync bug discovered in the Azure CDN service known as Front Door.

https://blog.jeti.pw/posts/knocking-on-the-front-door

#azure
👍1🔥1👏1
🔶 Hacking Github AWS integrations again

Another post looking at the perils of unproperly scoping access provided by OIDC.

https://dagrz.com/writing/aws-security/hacking-github-aws-oidc

#aws
🔥21👍1
🔶 AWS Security Monitoring in 2023: Untangle the chaos

This post provides recommendations for implementing an effective security monitoring strategy in AWS.

https://marbot.io/blog/2023-08-04-aws-security-monitoring-in-2023.html

#aws
👍4🔥1😱1
🔶 SSRF Tricks - Thread

Some tricks «rhynorater» picked up over the past 5 years of web app testing.

https://x.com/rhynorater/status/1689400476452679682?s=52&t=J3j_Bp59pI4rfliKITPeZQ

(Use VPN to open from Russia)

#aws
👍41🔥1😱1
🔷 An Azure Tale of VPN, Conditional Access and MFA Bypass

A walkthrough review of the implementation of an on-prem VPN server that used Azure AD as the idP and enforced MFA via conditional access policies.

https://simondotsh.com/infosec/2023/08/15/azure-tale-vpn-ca-mfa-bypass.html

#azure
👍3🔥1👏1
🔶 When a Zero Day and Access Keys Collide in the Cloud: Responding to the SugarCRM Zero-Day Vulnerability

Threat actors used SugarCRM's zero-day CVE-2023-22952 and cloud account misconfigurations to access credentials.

https://unit42.paloaltonetworks.com/sugarcrm-cloud-incident-black-hat

#aws
👍51🔥1
🔶 Identifying & Reducing Permission Explosion in AWS

The slides of a BlackHat 2023 talk that discusses how to identify, fix, and prevent permission explosion in your AWS environment.

https://i.blackhat.com/BH-US-23/Presentations/US-23-Moolrajani-Reducing-AWS-Permission-Explosion.pdf

#aws
👍4🔥2👏1
🔶 How to setup geofencing and IP allow-list for Cognito user pool

AWS recently announced that is now possible to enable WAF protection for Cognito user pools. And one of the things you can do with this is to implement geo-fencing and IP allow/deny lists.

https://theburningmonk.com/2022/08/how-to-setup-geofencing-and-ip-allow-list-for-cognito-user-pool/

#aws
👍3🔥2😱1
🔶 Terraform best practices for reliability at any scale

At scale, many Terraform state files are better than one. But how do you draw the boundaries and decide which resources belong in which state files? What are the best practices for organizing Terraform state files to maximize reliability, minimize the blast-radius of changes, and align with the design of cloud providers?

https://substrate.tools/blog/terraform-best-practices-for-reliability-at-any-scale

#aws
👍3👎1🔥1😱1
🔶 Methods to Backdoor an AWS Account

Post exploring some methods that an adversary can use to create backdoors in your AWS account: access keys, AssumeRole, changing Security Groups, UserData noscripts, and SSM Send-Command.

https://mystic0x1.github.io/posts/methods-to-backdoor-an-aws-account/

#aws
👍6🔥1👏1
🔶 Pivoting Clouds in AWS Organizations: Examining AWS Security Features and Tools for Enumeration

The architecture and considerable number of enabled/delegated service possibilities in AWS Organizations presents a serious vector for lateral movement within corporate environments. This could easily turn a single AWS account takeover into a multiple account takeover.

https://www.netspi.com/blog/technical/cloud-penetration-testing/pivoting-clouds-aws-organizations-part-2/

#aws
👍3🔥1👏1
🔶 Risk in AWS SSM Port Forwarding

A surprising AWS Systems Manager Session Manager (SSM) default that can introduce risk, especially for customers using SSM's Port Forwarding features.

https://ramimac.me/ssm-iam

#aws
👍4🔥1👏1