Cloud Village Talks

GCPwn: A Pentester’s GCP Tool 

Scott Weston

Scott Weston
Senior Security Consultant

GCPwn: A Pentester’s GCP Tool 

Scott Weston

Scott Weston
Senior Security Consultant

When discussing the various cloud providers within the last decade, Google Cloud Platform (GCP) is often seen as the smaller provider following AWS and Azure with regards to market share. While GCP might appear smaller than its rival cloud providers, it still is very much in use today, and with this use comes the opportunities for developing pentesting tools. As I’ve been learning GCP over the last year, I have been making a framework in python (much like Pacu for AWS) specifically for GCP. This includes enumeration modules for some of the core services (Cloud Storage, Cloud Functions, Cloud Compute, IAM) along with the incorporation of numerous exploit modules, many of them rooted in Rhino Security’s currently public GCP exploit repository (https://github.com/RhinoSecurityLabs/GCP-IAM-Privilege-Escalation/tree/master).

In addition, the framework is built such that it should be easy for a first-time GCP user or beginner to code and develop modules that focus on purely navigating individual resources and easily drop those into the framework. The overall goal is to make an up-to-date, maintained enumeration and exploit toolset for GCP pentesters/red teams/researchers alike that reduces the barrier of entry for learning GCP by allowing average users to make their own modules that easily incorporate with the overall framework. The corresponding open source code can currently be found here: https://github.com/NetSPI/gcpwn

Identity Theft is Not a Joke, Azure!

Karl Fosaaen

Karl Fosaaen
VP Research

Identity Theft is Not a Joke, Azure!

Karl Fosaaen

Karl Fosaaen
VP Research

As Azure services continue to expand and evolve, their associated authentication methodologies have also changed. Having mostly moved away from storing credentials in cleartext, most Azure services utilize Managed Identities to offer a more secure approach to access management. However, Managed Identities can bring their own challenges and risks.

In this talk, we delve into the nuanced landscape of Managed Identities across multiple Azure services. We explore how attackers exploit access to services with these identities to escalate privileges, move laterally, and establish persistence within Azure tenants. We will also provide helpful tips for defenders trying to identify these attacks. Finally, we will showcase a tool designed to automate attacks against User-Assigned Managed Identities.

AppSec Village Talks

The Immortal Retrofuturism of Mainframe Computers and How to Keep Them Safe 

Michelle Eggers

Michelle Eggers
Security Consultant

When you used your debit card today, do you know where that transaction was sent? Though it may conjure archival images of a 1950’s IT room stocked with enormous, low-tech machines, Mainframe technology is both modernized and heavily relied upon today. Mainframes are tasked with supporting not only the billions of banking and retail transactions that occur daily, but also managing the production workloads of government entities, healthcare conglomerates, transportation industries, and more.

Mainframe architecture is some of the most reliable tech heavily in operation today, able to manage incredibly large input/output volumes with low risk of downtime and there are few signs of it being sunset in the decades to come. As protectors of the cyber landscape, understanding how to secure mainframe architecture will remain important for any business entity that touches upon this behemoth technology.

In this talk we’ll explore the pervasiveness of mainframe technology, why it will remain relevant to the future landscape of mission critical-applications, and 5 trusted solutions for helping to secure these incredible computers

Interested in something a little more?

Check out what else we did at Hacker Summer Camp 2024