Successfully reported this slideshow.

Cloud Jacking™

3

Share

Cloud Jacking™
Exploiting AWS Route53, CloudFront, and S3
Agenda
• Who are you?
• What is subdomain hijacking?
• What is Route53, CloudFront, and S3?
• How I can exploit these serv...
Who are you?

YouTube videos are no longer supported on SlideShare

View original on YouTube

Loading in …3
×
1 of 28
1 of 28

Cloud Jacking™

3

Share

Subdomain hijacking presents significant security risks to organizations. Everything from credential theft to phishing can be made possible with a few keystrokes and click of a mouse. This talk focuses on how these risks materialize within an AWS cloud environment, how to enumerate their existence, and options to quickly mitigate them.

Subdomain hijacking presents significant security risks to organizations. Everything from credential theft to phishing can be made possible with a few keystrokes and click of a mouse. This talk focuses on how these risks materialize within an AWS cloud environment, how to enumerate their existence, and options to quickly mitigate them.

More Related Content

Similar to Cloud Jacking™

Related Books

Free with a 30 day trial from Scribd

See all

×