Sze Siong Teo | CyberCentral Summit 2019
Transcript available at: https://www.linkedin.com/pulse/sweet-bitter-cloud-computing-sze-siong-teo/
programming - 22 years
devops - 5 years
security - 8 years
industry exp. - 14 years
#1 Credential leak
https://hackerone.com/github/hacktivity (as of 24th March 2019)
https://hackerone.com/gitlab/hacktivity (as of 24th March 2019)
#2 Rogue supply chain
#3 Misconfigured cloud resources
http://bucket_name.s3-aws_region.amazonaws.com
Brute force with SecLists on below URL format:
Same approach for filenames when directory listing not available:
(Under the hood: aws s3 ls [target_bucket_name])
S3Scanner - https://github.com/sa7mon/S3Scanner
“The strategy around Zero Trust boils down to don’t trust anyone. We’re talking about, ‘Let’s cut off all access until the network knows who you are. Don’t allow access to IP addresses, machines, etc. until you know who that user is and whether they’re authorized.’”