Cloud Native Payloads: A Matryoshka Doll of Exploits | SANS@MIC Talk

Subscribers:
64,000
Published on ● Video Link: https://www.youtube.com/watch?v=xrVEka54d6I



Duration: 50:49
497 views
6


So, you want to start exploiting the cloud and bringing in those sweet bounties? What will Cloud Native do to your bounty payouts, and how can you make some more bread? 'Cloud Native applications' are appearing more and more these days. Over the last few years Moses Frost has been researching the impact of Cloud Native Applications and what these impacts could mean to building future exploits in the web. This talk will explain how chained exploits change with Cloud Native Applications.

Speaker Bio
Moses Frost (Hernandez) is a seasoned security professional with over 15 years in the IT industry. He has held positions as a network engineer, network architect, security architect, platform engineer, site reliability engineer, and consulting sales engineer. He has a background in complex network systems, systems administration, forensics, penetration testing, and development. He has worked with some of the largest companies in the nation as well as fast-growing, bootstrap startups.

Moses has developed information security regimens safeguarding some of the most sensitive personal data in the nation. He creates custom security software to find and mitigate unknown threats, and works on continually evolving his penetration testing skills.




Other Videos By SANS Institute


2020-06-05Waiting for a cyber range exercise is not enough | SANS@MIC Talk
2020-06-03Case Study: Airbus
2020-06-02WinSCP: Yeah you know me! | SANS@MIC Talk
2020-05-28Prioritizing OT Security Efforts: The Five Tactical Things to Accomplish | SANS@MIC Talk
2020-05-28Introduction to Docker for security work | SANS@MIC Talk
2020-05-27Threat Hunting and the Rise of Targeted eCrime Intrusions | STAR Webcast
2020-05-21Moving Past Just Googling It: Harvesting and Using OSINT | SANS@MIC Talk
2020-05-20Find_Evil - Threat Hunting | SANS@MIC Talk
2020-05-18Tricking modern endpoint security products | SANS@MIC Talk
2020-05-18Modern Domain Deception - The risk, issues and potentiality | SANS@MIC Talk
2020-05-14Cloud Native Payloads: A Matryoshka Doll of Exploits | SANS@MIC Talk
2020-05-14Incident Response in ICS in times of Lockdown | SANS@MIC Talk
2020-05-13SANS – Your Source for Cybersecurity Training – Live Online
2020-05-12Coalfire penetration testers charged with criminal trespass | SANS@MIC Talk
2020-05-12Using the OSINT Mind-State for Better Online Investigations | SANS@MIC Talk
2020-05-11Discovering Vulnerabilities Using IDA Scripting - SANS Pen Test HackFest Summit 2019
2020-05-07The Hackers Apprentice | SANS@MIC Talk
2020-05-07Information Security Misconceptions 2020 | SANS@MIC Talk
2020-05-05Course Preview: Successful Infosec Consulting, Getting Clients Deep Dive | SANS@MIC Talk
2020-05-05Accessing Data in the Cloud | SANS@MIC Talk
2020-04-30The SANS | GIAC Cybersecurity Training Experience: Get Ready for Something Phenomenal



Tags:
sans institute
information security
cyber security
cybersecurity
information security training
cybersecurity training
cyber security training
cloud native
exploits