This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Cloud Hacking – Distributed Attack Exploit Platform
From OWASP
We are witnessing applications, networks and infrastructures moving towards cloud computing. These clouds are emerging as a common platform to perform distributed attacks. Web/Enterprise 2.0 technologies are adding a new dimension to compromise cloud security. In this talk following topics will be covered with real life cases, tools and demonstrations.
- Fingerprinting and Footprinting clouds and resources
- Clouds internals and discoveries
- Cloud applications’ internal APIs and session hijacking & fixations
- Privilege and authorization escalations in cloud computing
- Network and Operating Systems hacks inside clouds
- Exploiting client side of cloud users
- Attack methods and exploits
- Impact analysis of cross domain access inside cloud - Twitter, Facebook, LinkedIn, MySpace etc.
- Google’s model and security threats – lessons to learn
- Live hacks and demos
- Tools to take away