Attacking Storage Services : The Lynchpin of Cloud Services

HITB Cyber Week Dubai: Red Team Village

2020/11/18

As part of HITB Cyber Week Dubai, I presented a Talk at Red Team Village

Slides

Video

AI Generated Summary

This talk from HITB Cyber Week Dubai Red Team Village focuses on attacking cloud storage services, which the speaker describes as “the linchpin of cloud services” - a critical component that, when compromised, can lead to massive damage to organizations.

Speaker Background

Key Topics Discussed

Cloud Storage Overview:

Real-World Attack Scenarios:

Amazon S3 Public Exposure:

HackerOne Case Study (2016):

Rocket Chat Case Study:

Linux Vendor Firmware Service (LVFS) Case Study:

Responsibility Distribution:

Attack Methodology:

Enumeration Techniques:

Storage Names are Unique:

Tools:

Cloud Enum Tool:

AWS Bucket Access:

Other Avenues:

Vulnerability Identification and Exploitation:

Focus Areas:

Azure SAS URL Exploitation:

Post-Exploitation - What Can Be Done:

More Case Studies:

SSRF to EC2 Takeover:

Platform as a Service Exploitation:

AWS Cognito:

Purpose of Case Studies:

Defenses:

Cloud Vendor Perspective:

Tenant Responsibilities:

Vendor Point of View:

AWS Config:

Validation:

Be Prepared for the Inevitable:

References:

Key Insights:

Actionable Takeaways:

  1. Cloud storage is critical - compromise can lead to massive damage
  2. Storage names are predictable - organizations append company names
  3. Use tools like Cloud Enum, cloud bucket URL scrapers, Google dorks
  4. SAS URLs are container-level - can access entire storage
  5. SSRF can lead to storage access via metadata
  6. Source code in storage can be backdoored
  7. Focus on IAM and data - always tenant responsibility
  8. Periodic validation of security measures essential
  9. Be aware of limitations - AWS Config periodicity, response times
  10. Simulate attacks to validate protections actually work