Cloudy with a Chance of Breaches: OSINTAdventures in Tracing Exposed Credentials

Subscribers:
23,600
Published on ● Video Link: https://www.youtube.com/watch?v=7IuufgR_AuQ



Duration: 36:36
221 views
9


SANS Blue Team Summit 2023
Cloudy with a Chance of Breaches: OSINTAdventures in Tracing Exposed Credentials
Speaker: Matt Edmondson, Principal Instructor

Cloud breaches due to stolen credentials have become an increasingly prevalent issue in today's digital landscape. With organizations rapidly adopting cloud technologies, understanding the origin of these breaches is crucial for proactive cybersecurity measures. This talk will delve into the practical application of Open Source Intelligence (OSINT) methodologies to investigate the source of cloud breaches resulting from stolen credentials. In this talk, we will discuss the role of OSINT in cloud security and highlight various tools and techniques that can be employed to find the source of exposed credentials and rule out other possible compromise paths. We will then provide a detailed walk-through of a real-world case study involving a compromised AWS S3bucket hosting a CMS website, demonstrating how OSINT can be effectively used to trace the source of a cloud breach.

Attendees will learn how to:
- Investigate AWS CloudTrail logs and identify an attacker's access key.
- Analyze GitHub repositories for accidental exposure of sensitive information.
- Perform a simple vulnerability scan of a CMS website to identify potential entry points.
- Utilize OSINT techniques to gather valuable information about the attacker's identity, tools, and tactics.
- Organize and correlate data gathered during investigation to uncover the most likely origin of the exposed credentials.

By learning from our real-world example, attendees will gain valuable insights into how to effectively investigate, respond to, and prevent similar security breaches in their own environments. Join us to explore the fascinating world of digital forensics and OSINT, and enhance your security skillset in the ever-evolving landscape of cloud technologies.

View upcoming Summits: http://www.sans.org/u/DuS




Other Videos By SANS Cyber Defense


2023-08-09Hunting for Suspicious HTTPS and TLS Connections
2023-08-03What does it take to author a cybersecurity book?
2023-07-31Join us for the SANS Open-Source Intelligence (OSINT) Summit 2023 - September 22!
2023-07-28The Risk to Space: Satellite Communications Systems and Ground Networks as Attack Targets
2023-07-28Drop It Like It's Qbot Separating malicious droppers, loaders, and crypters from their payloads
2023-07-28Panel | 1%: Tiny Gains producing Big Improvements
2023-07-28Zero Trust Architecture: Beyond Proxy or Point Solutions
2023-07-28Ecosystem of Insights: Building Operation Dashboards That Enable Teams
2023-07-28Bridging the Gap: Improving Rules Effectiveness by Integrating Detection and Response
2023-07-28Blueprint Live - 11 Strategies of a World-Class Cybersecurity Operations Center
2023-07-28Cloudy with a Chance of Breaches: OSINTAdventures in Tracing Exposed Credentials
2023-07-28Hunting OneNote Malware: A Practical Guide for Blue Teams
2023-07-28BlueHound: Blue Teams of the World Unite!
2023-07-28The Cyber Pilfer Chain: detecting and disrupting post-exploitation data theft
2023-07-28Keynote | How to Save Your SOC from Stagnation
2023-07-28Keynote | Leave Only Footprints: When Prevention Fails
2023-07-28Blurple Teaming: Open Source Continuous Security Testing in the SOC
2023-07-18Strategies of a World-Class SOC | Host: John Hubbard | July 18, 2023
2023-07-17Strategy 11: Turn up the Volume by Expanding SOC Functionality
2023-07-14Threat Hunting via DeepBlueCLI v3
2023-07-10Strategy 10: Measure Performance to Improve Performance | SANS Blueprint Podcast



Tags:
cyber defense
cyber security
cyber defense training
cyber security training
cybersecurity
cybersecurity training
OSINT
Matt Edmondson
blue team
blue teaming
sans blue team summit
blue team summit
blue teaming cyber security
OSINT methodologies
OSINT techniques
matt edmondson osint
osint investigation
osint investigation techniques
osint tactics
osint tools
cloud breach
cloud security
cloud breaches