24
演讲题目 Penetration Testing the Cloud

Penetration testing the cloud - vlad gostom

Embed Size (px)

Citation preview

Page 1: Penetration testing the cloud - vlad gostom

演讲题目

Penetrat ion Test ing the

Cloud

Page 2: Penetration testing the cloud - vlad gostom

Thank You

• Cloud Connect China

• Sponsors

• Department 83

• Peoples Republic of China

Page 3: Penetration testing the cloud - vlad gostom

Background

• Vlad Gostomelsky

• Managing Consultant

• Penetration Tester 16+ years

• Spirent Communications

• Banks, Vehicles, ICS, Wireless, Embedded Systems, Satellites, Power Generation

Page 4: Penetration testing the cloud - vlad gostom

Assumptions

• Currently deployed cloud hosting

• Plan to transition to cloud hosted data center

Page 5: Penetration testing the cloud - vlad gostom

Advantages

• Overhead Costs

• Pay only for what’s used

• Elastic Capacity

• Agile

• Infrastructure as a Service

Page 6: Penetration testing the cloud - vlad gostom

Model

• Public

• Private

• Community

• Hybrid

Page 7: Penetration testing the cloud - vlad gostom

Attack Surface

• External Attacks

• Internal Attacks

Page 8: Penetration testing the cloud - vlad gostom

Cloud Attack Surface

• External Attacks

• Internal Attacks

• Provider

• Misconfiguration

• Hypervisor Attacks

• Government/National Security Letters

Page 9: Penetration testing the cloud - vlad gostom

External Attacks

• Front End

• Exposed Interfaces

• Misconfigurations

• Malicious Clients

Page 10: Penetration testing the cloud - vlad gostom

Internal Attacks

• Malicious Employees

• Disgruntled former Employees

• Incompetence

Page 11: Penetration testing the cloud - vlad gostom

Provider Attacks

• Hypervisor

• Trust

• Routing

• Certificates

Page 12: Penetration testing the cloud - vlad gostom

Hypervisor Attacks

• Vulnerability in the virtualization platform

• Known 0 days

• Transparency from Providers

• Auditing

• Code Review

Page 13: Penetration testing the cloud - vlad gostom

Routing

• DOS/DDOS

• Preferred DNS

• Shunning

• False BGP Route advertising

• Load Balancing

• Content Injection

Page 14: Penetration testing the cloud - vlad gostom

Certificates

• Certificate Authority

• Forged Certificates

Page 15: Penetration testing the cloud - vlad gostom

Public Cloud

• Shared Environment

• Malicious Clients

• Profiling

• Crossover Attacks

• Increased Exposure due to Other Services

Page 16: Penetration testing the cloud - vlad gostom

Private Cloud

• Isolated Environment

• Profiling

Page 17: Penetration testing the cloud - vlad gostom

Differences

Page 18: Penetration testing the cloud - vlad gostom

Conventional Attacks

• Exposed Services

• API

• Unauthenticated API Calls

Page 19: Penetration testing the cloud - vlad gostom

Admin Interface

• Malicious Insiders

• Misconfiguration

• Routing Errors

Page 20: Penetration testing the cloud - vlad gostom

Internal IPs

• Compromise

• Entrench

• Pivot

• Repeat

Page 21: Penetration testing the cloud - vlad gostom

Testing

• Upload Malicious Hypervisor

• Back-Doored OS

• Ability to download and examine OS

• Transparency

• Pivot

Page 22: Penetration testing the cloud - vlad gostom

Migration

• Most vulnerable point

• All data virtualized

• Unsupervised transfer

• Potential for tampering

Page 23: Penetration testing the cloud - vlad gostom

Migration Done Right

• Process

• Plan

• Audit

• Verification