Last day to get an iPad Air w/ Smart Keyboard or Pixel 4a Smartphone with 5-6 day course registration! View details.


To attend this webcast, login to your SANS Account or create your Account.

This webcast has been archived. To view the webcast login into your SANS Portal Account or create an account by clicking the "Get Registered" button on the right. Once you register, you can download the presentation slides below.

SANS CyberCast - SANS@Mic -Attacking Serverless Servers: Reverse Engineering the AWS, Azure, and GCP Function Runtimes

  • Wednesday, March 25, 2020 at 8:30 PM EDT (2020-03-26 00:30:00 UTC)
  • Brandon Evans

You can now attend the webcast using your mobile device!



The cloud makes it easy for developers to launch their applications, integrate with managed services, and think little about the underlying infrastructure. Unfortunately, this can and has come back to bite us. Last year's Capital One breach has made security professionals all too aware of the internal details of AWS, such as the EC2 Instance Metadata Service, which allowed a malicious actor to steal credentials for an IAM role that enabled them to pilfer documents from countless S3 buckets. The serverless ecosystem is no different. In order to give our functions access to the cloud services they need, the cloud provider needs to provide them with the necessary credentials. If a function's runtime is owned, so are these credentials. This presentation will explain how a compromised serverless function can be used to exfiltrate sensitive data, persist malware, gain powerful credentials, and pivot to other cloud services. It will contain live demonstrations of creating and exploiting reverse shell connections for AWS Lambda, Azure Functions, and Google Cloud Functions. These malicious functions and associated research have been published on GitHub by Brandon Evans and Eric Johnson under a repository called "Serverless Prey" (

Speaker Bio

Brandon Evans

Brandon works for Zoom Video Communications, in which he leads their internal Application Security training. As an application developer for most of his professional career, he moved into security full-time largely because of his many formal trainings through SANS. He’s a contributor to the OWASP Serverless Top 10 Project and a co-leader for the Nashville OWASP chapter. Brandon is lead author for the new SEC510: Public Cloud Security: AWS, Azure, and GCP and a contributor and instructor for SEC540: Cloud Security and DevOps Automation. Read more about Brandon here.

Need Help? Visit our FAQ page or email

Not able to attend a SANS webcast? All Webcasts are archived so you may view and listen at a time convenient to your schedule. View our webcast archive and access webcast recordings/PDF slides.