SlideShare a Scribd company logo
1 of 61
Download to read offline
Launch into The Stratus-phere
Adversary Simulation in the Cloud Environment
Satria Ady Pradana
@xathrya_
Grab Red Team
whoami
Satria Ady Pradana
● Senior Security Engineer (Red Team) at Grab
● Community Leader of Reversing.ID
● Malware analyst and developer in my free time.
@xathrya @xathrya_
xathrya
xathrya
Simulating
the Adversaries
What is Adversary Simulation?
Simulating Tactics, Techniques, and
Procedures (TTPs) used by adversaries or
threat actors within controlled environment
to evaluate the security posture of the
organization.
Can we detect this threat?
Can we reproduce it? Can we still detect it?
Do it 1,000 times!
● Emulated attacks must be performed in a repeatable,
consumable, actionable way.
● Predictable outcome and side effects.
● Action should improve detection.
Challenges in the Cloud
● Complexities in reproducing attack
○ Different cloud providers, different requirements
○ Setup correct environment for testing
● Emerging threat landscapes
● Not enough data available on cloud incidents
References:
- https://owasp.org/www-project-cloud-native-application-security
-top-10/
- https://cloudsecurityalliance.org/research/topics/top-threats/
- https://www.packetlabs.net/posts/cloud-security/
MITRE ATT&CK (Cloud Matrix)
Various Tools for Adversary Simulation
But none for cloud native
Adversary Simulation
with Stratus
Introducing Stratus
X
=
Stratus
● Single-file native executable.
● Test cases mapped to ATT&CK tactics
● Infrastructure setup via terraform
● Attack logic implemented in golang
● “Atomic Red Team for the Cloud Native”
● Supports AWS, Azure, GCP, and Kubernetes
State Machine
WARMUP
Spin up pre-requisite infrastructure
without detonating
DETONATE
Execute the attack technique
REVERT
Revert to a state where attack can
be detonated again
CLEANUP
Remove all pre-requisite
infrastructure from environment.
Installation
Mac
brew tap “datadog/stratus-red-team” “https://github.com/datadog/stratus-red-team”
brew install datadog/stratus-red-team/stratus-red-team
Build Scratch
git clone https://github.com/datadog/stratus-red-team.git && cd stratus-red-team
make
https://stratus-red-team.cloud/user-guide/getting-started/
Connecting Account
AWS
aws configure
export AWS_PROFILE=my-profile
Azure
az login
export AZURE_SUBSCRIPTION_ID=`az account list | jq ".id"`
GCP
gcloud auth application-default login
export GOOGLE_PROJECT=project-id
https://stratus-red-team.cloud/user-guide/getting-started/
Available Techniques
stratus list
http://stratus-red-team.cloud/attack-techniques/list/
AWS (27)
Azure (3)
GCP (6)*
Kubernets (8)
Available Techniques
stratus list --platform gcp
stratus list --mitre-attack-tactic exfiltration
Available Techniques (2)
Attack techniques are organized by platform and tactic using the following naming format:
PLATFORM [.] TACTIC [.] TECHNIQUE
Example: exfiltration technique identified as gcp.exfiltration.share-compute-disk
Case: Exfiltration
http://stratus-red-team.cloud/attack-techniques/list/
Case: Exfiltration
https://stratus-red-team.cloud/attack-techniques/GCP/gcp.exfiltration.share-compute-disk/
stratus show gcp.exfiltration.share-compute-disk
This explain that scenario will create/require 1 Compute Disk, 1 IAM Policy.
Case: Exfiltration
https://stratus-red-team.cloud/attack-techniques/GCP/gcp.exfiltration.share-compute-disk/
Warm Up (Setup)
stratus warmup gcp.exfiltration.share-compute-disk
Detonate (Execute)
stratus detonate gcp.exfiltration.share-compute-disk
Clean Up (Destroy)
stratus cleanup gcp.exfiltration.share-compute-disk
Warming Up
stratus warmup gcp.exfiltration.share-compute-disk
Pass template to
Template embedded in
Deploys to
Warming Up (2)
gcloud compute disks list
Detonating
stratus detonate gcp.exfiltration.share-compute-disk
Attack implemented in Performs to
SDK for GCP
Detonating - Checking Policy
after
before
gcloud compute disks get-iam-policy stratus-red-team-victim-disk --zone us-central1-a
Detecting Attack (Log)
1
2
Detecting Attack (Log) cont’d
2
1
Bind what role to who?
Which resource?
Cleaning Up
stratus cleanup gcp.exfiltration.share-compute-disk
Invokes Destroying
infrastructure
Check Status
stratus status
stratus status gcp.exfiltration.share-compute-disk
Stratus
Under the Hood
Where is the State?
States and prerequisites are stored in ~/.stratus-red-team directory
Each directory represent attack technique/scenario.
It is populated when attack scenario is active.
Where is the Attack Technique?
See $STRATUS/v2/internals/attacktechniques directory.
Attack techniques are sorted by platform and ATT&CK tactics.
Where is the Attack Technique?
$STRATUS/v2/internals/attacktechniques/main.go file register all techniques included in build.
Terraform
Declare/define the minimum
infrastructure needed for the
scenario.
Responsible for warmup and
cleanup.
See the terraform for each
providers:
- AWS
- AzureRM (Azure)
- Google (GCP)
- Kubernetes
sample: gcp.exfiltration.share-compute-disk
Go
Implement logic of attack.
Responsible for detonate and revert.
Register the attack technique inside the init() function:
- ID (ex: gcp.exfiltration.share-compute-disk)
- Description
- Detection (IoC)
- Platform (AWS/GCP/Azure/Kubernetes)
- MITRE ATT&CK tactics, i.e: exfiltration, persistence
- Detonate and Revert function
Go - Register Attack Technique
Go - Attack Implementation
Go - Attack Implementation
See some functionalities defined:
- Internal functions for various tasks.
- Which functionalities handled by libraries
- How data passed from terraform to go.
See how action done with raw request.
- Ex: what happen when we set IAM policy?
Develop New Attack
Techniques
Our Contribution
We create 15 new scenarios for GCP during internal engagement:
- gcp.credential-access.kms-decrypt-file
- gcp.credential-access.secretmanager-retrieve-secrets
- gcp.execution.gce-launch-unusual-instances
- gcp.exfiltration.gcs-backdoor-bucket-policy
- gcp.exfiltration.gcs-transfer-external-bucket
- gcp.exfiltration.sql-export-bucket
- gcp.impact.gcs-ransomware-client-side-encryption
- gcp.impact.gcs-ransomware-individual-deletion
- gcp.lateral-movement.add-sshkey-instance-metadata
- gcp.lateral-movement.add-sshkey-project-metadata
- gcp.lateral-movement.osconfig-execute-job
- gcp.lateral-movement.oslogin-import-sshkey
- gcp.lateral-movement.reset-windows-account
- gcp.lateral-movement.ssh-execute-command
- gcp.persistence.osconfig-create-deployment
Got Inspiration ?
New publication
- Attack vector
- Zero day vulnerability
- Threat intelligence report
Existing tools, for
- Exploitation
- Lateral movement
- Persistence
Example: cloud ransomware
- https://www.firemon.com/what-you-need-to-know-about-ransomware-in-aws/
- https://rhinosecuritylabs.com/aws/s3-ransomware-part-1-attack-vector/
But it’s for AWS S3 bucket
Key Point
Cloud native attack must involve cloud-specific features and characteristics.
The proposed attack scenario suggest that attacker who already had access to storage bucket
(i.e. AWS S3) would do:
- Use the data for lateral movement and other purposes.
- Delete all original data (including all the version)
- Encrypt all original data
- Using key in KMS
- Using customer supplied key
Can we detect when malicious action done to the data?
Can we prevent the action before it happen?
References:
- https://www.firemon.com/what-you-need-to-know-about-ransomware-in-aws/
- https://rhinosecuritylabs.com/aws/s3-ransomware-part-1-attack-vector/
How to Create a New Scenario
Adopting the scenario into GCP environment!
- Define objective:
- Encrypt all files on a storage bucket with customer supplied key.
- Define characteristic of attack:
- Infrastructure needed (warmup/cleanup)
- Execution of attack (detonation)
- Repeatable action? Reversible?
- Identify side effects and limitation
- Identify IoC for detection
Scenario Breakdown
Terraform - Random Generator
Resource need to be globally unique.
Need a way to generate random name
or ID to avoid conflict.
- Storage bucket
- Object name
- Object size
Should the content static?
Or dynamically generated?
Terraform - Create Bucket
Enable object versioning.
Object can have multiple versions but
only 1 live version available.
Terraform - Create Objects
Populate objects by random name, extensions, and content.
Go - Dependencies
Use standard SDK as much as possible.
- Search the package from https://pkg.go.dev/
Write common functions as libraries / internal utilities.
Go - Detonation Flow
Flow
- Download all objects
- Encrypt all objects
- Remove old versions
- Upload ransomware note
Go - Encrypt Objects
Get list of objects
Encrypt each entries
Delete the old version
Go - Reversion Flow
Flow
- Decrypt all objects
- Remove encrypted files
Go - Decrypt Objects
Skip the ransomware note
Decrypt each entries
Delete the old (encrypted) version
Go - Register Attack Technique
Add to Build
Open v2/internals/attacktechniques/main.go and add
Testing the Scenario (Warmup)
bin/stratus warmup gcp.impact.gcs-ransomware-client-side-encryption
Testing the Scenario (Detonation)
bin/stratus detonate gcp.impact.gcs-ransomware-client-side-encryption
series of request for encrypting files and deleting files
request response
gsutil cat gs://BUCKET/FILENAME
BEFORE
AFTER
Prepared by Satria Ady Pradana
17th October 2023 | Version 1
We are hiring!
https://grab.careers

More Related Content

What's hot

Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseLance Peterman
 
Introduction to Android Development
Introduction to Android DevelopmentIntroduction to Android Development
Introduction to Android DevelopmentAly Abdelkareem
 
Intents in Android
Intents in AndroidIntents in Android
Intents in Androidma-polimi
 
Android resources
Android resourcesAndroid resources
Android resourcesma-polimi
 
Helping Small Companies Leverage CTI with an Open Source Threat Mapping
Helping Small Companies Leverage CTI with an Open Source Threat MappingHelping Small Companies Leverage CTI with an Open Source Threat Mapping
Helping Small Companies Leverage CTI with an Open Source Threat MappingMITRE - ATT&CKcon
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application SecurityAbdul Wahid
 
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdf
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdfNosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdf
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdfidsecconf
 
Introduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityIntroduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityAndrew Wong
 
COSAC 2021 presentation - AWS Zero Trust
COSAC 2021 presentation - AWS Zero TrustCOSAC 2021 presentation - AWS Zero Trust
COSAC 2021 presentation - AWS Zero TrustFrans Sauermann
 
Cybersecurity Operations: Examining the State of the SOC
Cybersecurity Operations: Examining the State of the SOCCybersecurity Operations: Examining the State of the SOC
Cybersecurity Operations: Examining the State of the SOCFidelis Cybersecurity
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesDheeraj Negi
 
Google Cloud IoT Core
Google Cloud IoT CoreGoogle Cloud IoT Core
Google Cloud IoT CoreIdo Flatow
 
Practical API Security - PyCon 2018
Practical API Security - PyCon 2018Practical API Security - PyCon 2018
Practical API Security - PyCon 2018Adam Englander
 
Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)Amit Tyagi
 
Machine Learning Based Botnet Detection
Machine Learning Based Botnet DetectionMachine Learning Based Botnet Detection
Machine Learning Based Botnet Detectionbutest
 

What's hot (20)

Google cloud
Google cloudGoogle cloud
Google cloud
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
 
Introduction to Android Development
Introduction to Android DevelopmentIntroduction to Android Development
Introduction to Android Development
 
Intents in Android
Intents in AndroidIntents in Android
Intents in Android
 
Okta docs
Okta docsOkta docs
Okta docs
 
Android resources
Android resourcesAndroid resources
Android resources
 
Helping Small Companies Leverage CTI with an Open Source Threat Mapping
Helping Small Companies Leverage CTI with an Open Source Threat MappingHelping Small Companies Leverage CTI with an Open Source Threat Mapping
Helping Small Companies Leverage CTI with an Open Source Threat Mapping
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdf
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdfNosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdf
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdf
 
CLOUD NATIVE SECURITY
CLOUD NATIVE SECURITYCLOUD NATIVE SECURITY
CLOUD NATIVE SECURITY
 
Introduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityIntroduction - Trend Micro Deep Security
Introduction - Trend Micro Deep Security
 
COSAC 2021 presentation - AWS Zero Trust
COSAC 2021 presentation - AWS Zero TrustCOSAC 2021 presentation - AWS Zero Trust
COSAC 2021 presentation - AWS Zero Trust
 
Cybersecurity Operations: Examining the State of the SOC
Cybersecurity Operations: Examining the State of the SOCCybersecurity Operations: Examining the State of the SOC
Cybersecurity Operations: Examining the State of the SOC
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Google Cloud IoT Core
Google Cloud IoT CoreGoogle Cloud IoT Core
Google Cloud IoT Core
 
Practical API Security - PyCon 2018
Practical API Security - PyCon 2018Practical API Security - PyCon 2018
Practical API Security - PyCon 2018
 
Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)
 
Dos n d dos
Dos n d dosDos n d dos
Dos n d dos
 
Stuxnet
StuxnetStuxnet
Stuxnet
 
Machine Learning Based Botnet Detection
Machine Learning Based Botnet DetectionMachine Learning Based Botnet Detection
Machine Learning Based Botnet Detection
 

Similar to idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary Simulation in the Cloud Environment.pdf

Three Years of Lessons Running Potentially Malicious Code Inside Containers
Three Years of Lessons Running Potentially Malicious Code Inside ContainersThree Years of Lessons Running Potentially Malicious Code Inside Containers
Three Years of Lessons Running Potentially Malicious Code Inside ContainersBen Hall
 
AppSec California 2016 - Making Security Agile
AppSec California 2016 - Making Security AgileAppSec California 2016 - Making Security Agile
AppSec California 2016 - Making Security AgileOleg Gryb
 
I got 99 trends and a # is all of them
I got 99 trends and a # is all of themI got 99 trends and a # is all of them
I got 99 trends and a # is all of themRoberto Suggi Liverani
 
Digital Forensics and Incident Response in The Cloud Part 3
Digital Forensics and Incident Response in The Cloud Part 3Digital Forensics and Incident Response in The Cloud Part 3
Digital Forensics and Incident Response in The Cloud Part 3Velocidex Enterprises
 
Lessons Learnt from Running Thousands of On-demand Spark Applications
Lessons Learnt from Running Thousands of On-demand Spark ApplicationsLessons Learnt from Running Thousands of On-demand Spark Applications
Lessons Learnt from Running Thousands of On-demand Spark ApplicationsItai Yaffe
 
SANS_PentestHackfest_2022-PurpleTeam_Cloud_Identity.pptx
SANS_PentestHackfest_2022-PurpleTeam_Cloud_Identity.pptxSANS_PentestHackfest_2022-PurpleTeam_Cloud_Identity.pptx
SANS_PentestHackfest_2022-PurpleTeam_Cloud_Identity.pptxJasonOstrom1
 
Kubernetes Summit 2019 - Harden Your Kubernetes Cluster
Kubernetes Summit 2019 - Harden Your Kubernetes ClusterKubernetes Summit 2019 - Harden Your Kubernetes Cluster
Kubernetes Summit 2019 - Harden Your Kubernetes Clustersmalltown
 
Tips on Securing Drupal Sites - DrupalCamp Atlanta (DCA)
Tips on Securing Drupal Sites - DrupalCamp Atlanta (DCA)Tips on Securing Drupal Sites - DrupalCamp Atlanta (DCA)
Tips on Securing Drupal Sites - DrupalCamp Atlanta (DCA)cgmonroe
 
Improving Apache Spark Downscaling
 Improving Apache Spark Downscaling Improving Apache Spark Downscaling
Improving Apache Spark DownscalingDatabricks
 
Automated malware analysis
Automated malware analysisAutomated malware analysis
Automated malware analysisIbrahim Baliç
 
Monitoring as Code: Getting to Monitoring-Driven Development - DEV314 - re:In...
Monitoring as Code: Getting to Monitoring-Driven Development - DEV314 - re:In...Monitoring as Code: Getting to Monitoring-Driven Development - DEV314 - re:In...
Monitoring as Code: Getting to Monitoring-Driven Development - DEV314 - re:In...Amazon Web Services
 
Hadoop cluster performance profiler
Hadoop cluster performance profilerHadoop cluster performance profiler
Hadoop cluster performance profilerIhor Bobak
 
Reversing & malware analysis training part 12 rootkit analysis
Reversing & malware analysis training part 12   rootkit analysisReversing & malware analysis training part 12   rootkit analysis
Reversing & malware analysis training part 12 rootkit analysisAbdulrahman Bassam
 
LinuxCon 2013 Steven Dake on Using Heat for autoscaling OpenShift on Openstack
LinuxCon 2013 Steven Dake on Using Heat for autoscaling OpenShift on OpenstackLinuxCon 2013 Steven Dake on Using Heat for autoscaling OpenShift on Openstack
LinuxCon 2013 Steven Dake on Using Heat for autoscaling OpenShift on OpenstackOpenShift Origin
 
Jörg Schad - Hybrid Cloud (Kubernetes, Spark, HDFS, …)-as-a-Service - Codemot...
Jörg Schad - Hybrid Cloud (Kubernetes, Spark, HDFS, …)-as-a-Service - Codemot...Jörg Schad - Hybrid Cloud (Kubernetes, Spark, HDFS, …)-as-a-Service - Codemot...
Jörg Schad - Hybrid Cloud (Kubernetes, Spark, HDFS, …)-as-a-Service - Codemot...Codemotion
 
Jörg Schad - Hybrid Cloud (Kubernetes, Spark, HDFS, …)-as-a-Service - Codemot...
Jörg Schad - Hybrid Cloud (Kubernetes, Spark, HDFS, …)-as-a-Service - Codemot...Jörg Schad - Hybrid Cloud (Kubernetes, Spark, HDFS, …)-as-a-Service - Codemot...
Jörg Schad - Hybrid Cloud (Kubernetes, Spark, HDFS, …)-as-a-Service - Codemot...Codemotion
 

Similar to idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary Simulation in the Cloud Environment.pdf (20)

Three Years of Lessons Running Potentially Malicious Code Inside Containers
Three Years of Lessons Running Potentially Malicious Code Inside ContainersThree Years of Lessons Running Potentially Malicious Code Inside Containers
Three Years of Lessons Running Potentially Malicious Code Inside Containers
 
AppSec California 2016 - Making Security Agile
AppSec California 2016 - Making Security AgileAppSec California 2016 - Making Security Agile
AppSec California 2016 - Making Security Agile
 
Us 17-krug-hacking-severless-runtimes
Us 17-krug-hacking-severless-runtimesUs 17-krug-hacking-severless-runtimes
Us 17-krug-hacking-severless-runtimes
 
Breach and attack simulation tools
Breach and attack simulation toolsBreach and attack simulation tools
Breach and attack simulation tools
 
I got 99 trends and a # is all of them
I got 99 trends and a # is all of themI got 99 trends and a # is all of them
I got 99 trends and a # is all of them
 
Digital Forensics and Incident Response in The Cloud Part 3
Digital Forensics and Incident Response in The Cloud Part 3Digital Forensics and Incident Response in The Cloud Part 3
Digital Forensics and Incident Response in The Cloud Part 3
 
RAT - Repurposing Adversarial Tradecraft
RAT - Repurposing Adversarial TradecraftRAT - Repurposing Adversarial Tradecraft
RAT - Repurposing Adversarial Tradecraft
 
Lessons Learnt from Running Thousands of On-demand Spark Applications
Lessons Learnt from Running Thousands of On-demand Spark ApplicationsLessons Learnt from Running Thousands of On-demand Spark Applications
Lessons Learnt from Running Thousands of On-demand Spark Applications
 
SANS_PentestHackfest_2022-PurpleTeam_Cloud_Identity.pptx
SANS_PentestHackfest_2022-PurpleTeam_Cloud_Identity.pptxSANS_PentestHackfest_2022-PurpleTeam_Cloud_Identity.pptx
SANS_PentestHackfest_2022-PurpleTeam_Cloud_Identity.pptx
 
Kubernetes 101 for_penetration_testers_-_null_mumbai
Kubernetes 101 for_penetration_testers_-_null_mumbaiKubernetes 101 for_penetration_testers_-_null_mumbai
Kubernetes 101 for_penetration_testers_-_null_mumbai
 
Kubernetes Summit 2019 - Harden Your Kubernetes Cluster
Kubernetes Summit 2019 - Harden Your Kubernetes ClusterKubernetes Summit 2019 - Harden Your Kubernetes Cluster
Kubernetes Summit 2019 - Harden Your Kubernetes Cluster
 
Tips on Securing Drupal Sites - DrupalCamp Atlanta (DCA)
Tips on Securing Drupal Sites - DrupalCamp Atlanta (DCA)Tips on Securing Drupal Sites - DrupalCamp Atlanta (DCA)
Tips on Securing Drupal Sites - DrupalCamp Atlanta (DCA)
 
Improving Apache Spark Downscaling
 Improving Apache Spark Downscaling Improving Apache Spark Downscaling
Improving Apache Spark Downscaling
 
Automated malware analysis
Automated malware analysisAutomated malware analysis
Automated malware analysis
 
Monitoring as Code: Getting to Monitoring-Driven Development - DEV314 - re:In...
Monitoring as Code: Getting to Monitoring-Driven Development - DEV314 - re:In...Monitoring as Code: Getting to Monitoring-Driven Development - DEV314 - re:In...
Monitoring as Code: Getting to Monitoring-Driven Development - DEV314 - re:In...
 
Hadoop cluster performance profiler
Hadoop cluster performance profilerHadoop cluster performance profiler
Hadoop cluster performance profiler
 
Reversing & malware analysis training part 12 rootkit analysis
Reversing & malware analysis training part 12   rootkit analysisReversing & malware analysis training part 12   rootkit analysis
Reversing & malware analysis training part 12 rootkit analysis
 
LinuxCon 2013 Steven Dake on Using Heat for autoscaling OpenShift on Openstack
LinuxCon 2013 Steven Dake on Using Heat for autoscaling OpenShift on OpenstackLinuxCon 2013 Steven Dake on Using Heat for autoscaling OpenShift on Openstack
LinuxCon 2013 Steven Dake on Using Heat for autoscaling OpenShift on Openstack
 
Jörg Schad - Hybrid Cloud (Kubernetes, Spark, HDFS, …)-as-a-Service - Codemot...
Jörg Schad - Hybrid Cloud (Kubernetes, Spark, HDFS, …)-as-a-Service - Codemot...Jörg Schad - Hybrid Cloud (Kubernetes, Spark, HDFS, …)-as-a-Service - Codemot...
Jörg Schad - Hybrid Cloud (Kubernetes, Spark, HDFS, …)-as-a-Service - Codemot...
 
Jörg Schad - Hybrid Cloud (Kubernetes, Spark, HDFS, …)-as-a-Service - Codemot...
Jörg Schad - Hybrid Cloud (Kubernetes, Spark, HDFS, …)-as-a-Service - Codemot...Jörg Schad - Hybrid Cloud (Kubernetes, Spark, HDFS, …)-as-a-Service - Codemot...
Jörg Schad - Hybrid Cloud (Kubernetes, Spark, HDFS, …)-as-a-Service - Codemot...
 

More from idsecconf

idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...idsecconf
 
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdfidsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdfidsecconf
 
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...idsecconf
 
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...idsecconf
 
Ali - The Journey-Hack Electron App Desktop (MacOS).pdf
Ali - The Journey-Hack Electron App Desktop (MacOS).pdfAli - The Journey-Hack Electron App Desktop (MacOS).pdf
Ali - The Journey-Hack Electron App Desktop (MacOS).pdfidsecconf
 
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...idsecconf
 
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdfRama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdfidsecconf
 
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...idsecconf
 
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...idsecconf
 
Utian Ayuba - Profiling The Cloud Crime.pdf
Utian Ayuba - Profiling The Cloud Crime.pdfUtian Ayuba - Profiling The Cloud Crime.pdf
Utian Ayuba - Profiling The Cloud Crime.pdfidsecconf
 
Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...idsecconf
 
Perkembangan infrastruktur kunci publik di indonesia - Andika Triwidada
Perkembangan infrastruktur kunci publik di indonesia - Andika TriwidadaPerkembangan infrastruktur kunci publik di indonesia - Andika Triwidada
Perkembangan infrastruktur kunci publik di indonesia - Andika Triwidadaidsecconf
 
Hacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabella
Hacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabellaHacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabella
Hacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabellaidsecconf
 
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...idsecconf
 
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwianto
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi DwiantoDevsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwianto
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwiantoidsecconf
 
Stream crime
Stream crime Stream crime
Stream crime idsecconf
 
(Paper) Mips botnet worm with open wrt sdk toolchains
(Paper) Mips botnet worm with open wrt sdk toolchains(Paper) Mips botnet worm with open wrt sdk toolchains
(Paper) Mips botnet worm with open wrt sdk toolchainsidsecconf
 
Mips router targeted worm botnet
Mips router targeted worm botnetMips router targeted worm botnet
Mips router targeted worm botnetidsecconf
 
The achilles heel of GPN Card implementation
The achilles heel of GPN Card implementationThe achilles heel of GPN Card implementation
The achilles heel of GPN Card implementationidsecconf
 
iot hacking, smartlockpick
 iot hacking, smartlockpick iot hacking, smartlockpick
iot hacking, smartlockpickidsecconf
 

More from idsecconf (20)

idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
 
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdfidsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
 
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
 
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
 
Ali - The Journey-Hack Electron App Desktop (MacOS).pdf
Ali - The Journey-Hack Electron App Desktop (MacOS).pdfAli - The Journey-Hack Electron App Desktop (MacOS).pdf
Ali - The Journey-Hack Electron App Desktop (MacOS).pdf
 
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
 
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdfRama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
 
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
 
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...
 
Utian Ayuba - Profiling The Cloud Crime.pdf
Utian Ayuba - Profiling The Cloud Crime.pdfUtian Ayuba - Profiling The Cloud Crime.pdf
Utian Ayuba - Profiling The Cloud Crime.pdf
 
Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...
 
Perkembangan infrastruktur kunci publik di indonesia - Andika Triwidada
Perkembangan infrastruktur kunci publik di indonesia - Andika TriwidadaPerkembangan infrastruktur kunci publik di indonesia - Andika Triwidada
Perkembangan infrastruktur kunci publik di indonesia - Andika Triwidada
 
Hacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabella
Hacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabellaHacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabella
Hacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabella
 
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
 
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwianto
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi DwiantoDevsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwianto
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwianto
 
Stream crime
Stream crime Stream crime
Stream crime
 
(Paper) Mips botnet worm with open wrt sdk toolchains
(Paper) Mips botnet worm with open wrt sdk toolchains(Paper) Mips botnet worm with open wrt sdk toolchains
(Paper) Mips botnet worm with open wrt sdk toolchains
 
Mips router targeted worm botnet
Mips router targeted worm botnetMips router targeted worm botnet
Mips router targeted worm botnet
 
The achilles heel of GPN Card implementation
The achilles heel of GPN Card implementationThe achilles heel of GPN Card implementation
The achilles heel of GPN Card implementation
 
iot hacking, smartlockpick
 iot hacking, smartlockpick iot hacking, smartlockpick
iot hacking, smartlockpick
 

Recently uploaded

Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewingbigorange77
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdfThe Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdfMilind Agarwal
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 

Recently uploaded (20)

young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewing
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdfThe Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 

idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary Simulation in the Cloud Environment.pdf

  • 1. Launch into The Stratus-phere Adversary Simulation in the Cloud Environment Satria Ady Pradana @xathrya_ Grab Red Team
  • 2. whoami Satria Ady Pradana ● Senior Security Engineer (Red Team) at Grab ● Community Leader of Reversing.ID ● Malware analyst and developer in my free time. @xathrya @xathrya_ xathrya xathrya
  • 4. What is Adversary Simulation? Simulating Tactics, Techniques, and Procedures (TTPs) used by adversaries or threat actors within controlled environment to evaluate the security posture of the organization. Can we detect this threat? Can we reproduce it? Can we still detect it?
  • 5. Do it 1,000 times! ● Emulated attacks must be performed in a repeatable, consumable, actionable way. ● Predictable outcome and side effects. ● Action should improve detection.
  • 6. Challenges in the Cloud ● Complexities in reproducing attack ○ Different cloud providers, different requirements ○ Setup correct environment for testing ● Emerging threat landscapes ● Not enough data available on cloud incidents References: - https://owasp.org/www-project-cloud-native-application-security -top-10/ - https://cloudsecurityalliance.org/research/topics/top-threats/ - https://www.packetlabs.net/posts/cloud-security/
  • 8. Various Tools for Adversary Simulation But none for cloud native
  • 11. Stratus ● Single-file native executable. ● Test cases mapped to ATT&CK tactics ● Infrastructure setup via terraform ● Attack logic implemented in golang ● “Atomic Red Team for the Cloud Native” ● Supports AWS, Azure, GCP, and Kubernetes
  • 12. State Machine WARMUP Spin up pre-requisite infrastructure without detonating DETONATE Execute the attack technique REVERT Revert to a state where attack can be detonated again CLEANUP Remove all pre-requisite infrastructure from environment.
  • 13. Installation Mac brew tap “datadog/stratus-red-team” “https://github.com/datadog/stratus-red-team” brew install datadog/stratus-red-team/stratus-red-team Build Scratch git clone https://github.com/datadog/stratus-red-team.git && cd stratus-red-team make https://stratus-red-team.cloud/user-guide/getting-started/
  • 14. Connecting Account AWS aws configure export AWS_PROFILE=my-profile Azure az login export AZURE_SUBSCRIPTION_ID=`az account list | jq ".id"` GCP gcloud auth application-default login export GOOGLE_PROJECT=project-id https://stratus-red-team.cloud/user-guide/getting-started/
  • 16. Available Techniques stratus list --platform gcp stratus list --mitre-attack-tactic exfiltration
  • 17. Available Techniques (2) Attack techniques are organized by platform and tactic using the following naming format: PLATFORM [.] TACTIC [.] TECHNIQUE Example: exfiltration technique identified as gcp.exfiltration.share-compute-disk
  • 19. Case: Exfiltration https://stratus-red-team.cloud/attack-techniques/GCP/gcp.exfiltration.share-compute-disk/ stratus show gcp.exfiltration.share-compute-disk This explain that scenario will create/require 1 Compute Disk, 1 IAM Policy.
  • 20. Case: Exfiltration https://stratus-red-team.cloud/attack-techniques/GCP/gcp.exfiltration.share-compute-disk/ Warm Up (Setup) stratus warmup gcp.exfiltration.share-compute-disk Detonate (Execute) stratus detonate gcp.exfiltration.share-compute-disk Clean Up (Destroy) stratus cleanup gcp.exfiltration.share-compute-disk
  • 21. Warming Up stratus warmup gcp.exfiltration.share-compute-disk Pass template to Template embedded in Deploys to
  • 22. Warming Up (2) gcloud compute disks list
  • 24. Detonating - Checking Policy after before gcloud compute disks get-iam-policy stratus-red-team-victim-disk --zone us-central1-a
  • 26. Detecting Attack (Log) cont’d 2 1 Bind what role to who? Which resource?
  • 27. Cleaning Up stratus cleanup gcp.exfiltration.share-compute-disk Invokes Destroying infrastructure
  • 28. Check Status stratus status stratus status gcp.exfiltration.share-compute-disk
  • 30. Where is the State? States and prerequisites are stored in ~/.stratus-red-team directory Each directory represent attack technique/scenario.
  • 31. It is populated when attack scenario is active.
  • 32. Where is the Attack Technique? See $STRATUS/v2/internals/attacktechniques directory. Attack techniques are sorted by platform and ATT&CK tactics.
  • 33. Where is the Attack Technique? $STRATUS/v2/internals/attacktechniques/main.go file register all techniques included in build.
  • 34. Terraform Declare/define the minimum infrastructure needed for the scenario. Responsible for warmup and cleanup. See the terraform for each providers: - AWS - AzureRM (Azure) - Google (GCP) - Kubernetes sample: gcp.exfiltration.share-compute-disk
  • 35. Go Implement logic of attack. Responsible for detonate and revert. Register the attack technique inside the init() function: - ID (ex: gcp.exfiltration.share-compute-disk) - Description - Detection (IoC) - Platform (AWS/GCP/Azure/Kubernetes) - MITRE ATT&CK tactics, i.e: exfiltration, persistence - Detonate and Revert function
  • 36. Go - Register Attack Technique
  • 37. Go - Attack Implementation
  • 38. Go - Attack Implementation See some functionalities defined: - Internal functions for various tasks. - Which functionalities handled by libraries - How data passed from terraform to go. See how action done with raw request. - Ex: what happen when we set IAM policy?
  • 40. Our Contribution We create 15 new scenarios for GCP during internal engagement: - gcp.credential-access.kms-decrypt-file - gcp.credential-access.secretmanager-retrieve-secrets - gcp.execution.gce-launch-unusual-instances - gcp.exfiltration.gcs-backdoor-bucket-policy - gcp.exfiltration.gcs-transfer-external-bucket - gcp.exfiltration.sql-export-bucket - gcp.impact.gcs-ransomware-client-side-encryption - gcp.impact.gcs-ransomware-individual-deletion - gcp.lateral-movement.add-sshkey-instance-metadata - gcp.lateral-movement.add-sshkey-project-metadata - gcp.lateral-movement.osconfig-execute-job - gcp.lateral-movement.oslogin-import-sshkey - gcp.lateral-movement.reset-windows-account - gcp.lateral-movement.ssh-execute-command - gcp.persistence.osconfig-create-deployment
  • 41. Got Inspiration ? New publication - Attack vector - Zero day vulnerability - Threat intelligence report Existing tools, for - Exploitation - Lateral movement - Persistence Example: cloud ransomware - https://www.firemon.com/what-you-need-to-know-about-ransomware-in-aws/ - https://rhinosecuritylabs.com/aws/s3-ransomware-part-1-attack-vector/
  • 42. But it’s for AWS S3 bucket
  • 43. Key Point Cloud native attack must involve cloud-specific features and characteristics. The proposed attack scenario suggest that attacker who already had access to storage bucket (i.e. AWS S3) would do: - Use the data for lateral movement and other purposes. - Delete all original data (including all the version) - Encrypt all original data - Using key in KMS - Using customer supplied key Can we detect when malicious action done to the data? Can we prevent the action before it happen? References: - https://www.firemon.com/what-you-need-to-know-about-ransomware-in-aws/ - https://rhinosecuritylabs.com/aws/s3-ransomware-part-1-attack-vector/
  • 44. How to Create a New Scenario Adopting the scenario into GCP environment! - Define objective: - Encrypt all files on a storage bucket with customer supplied key. - Define characteristic of attack: - Infrastructure needed (warmup/cleanup) - Execution of attack (detonation) - Repeatable action? Reversible? - Identify side effects and limitation - Identify IoC for detection
  • 46. Terraform - Random Generator Resource need to be globally unique. Need a way to generate random name or ID to avoid conflict. - Storage bucket - Object name - Object size Should the content static? Or dynamically generated?
  • 47. Terraform - Create Bucket Enable object versioning. Object can have multiple versions but only 1 live version available.
  • 48. Terraform - Create Objects Populate objects by random name, extensions, and content.
  • 49. Go - Dependencies Use standard SDK as much as possible. - Search the package from https://pkg.go.dev/ Write common functions as libraries / internal utilities.
  • 50. Go - Detonation Flow Flow - Download all objects - Encrypt all objects - Remove old versions - Upload ransomware note
  • 51. Go - Encrypt Objects Get list of objects Encrypt each entries Delete the old version
  • 52. Go - Reversion Flow Flow - Decrypt all objects - Remove encrypted files
  • 53. Go - Decrypt Objects Skip the ransomware note Decrypt each entries Delete the old (encrypted) version
  • 54. Go - Register Attack Technique
  • 55. Add to Build Open v2/internals/attacktechniques/main.go and add
  • 56. Testing the Scenario (Warmup) bin/stratus warmup gcp.impact.gcs-ransomware-client-side-encryption
  • 57. Testing the Scenario (Detonation) bin/stratus detonate gcp.impact.gcs-ransomware-client-side-encryption series of request for encrypting files and deleting files
  • 60. Prepared by Satria Ady Pradana 17th October 2023 | Version 1