SANS Cyber Defense Initiative® 2020 Live Online: 30+ Interactive Courses | Virtual NetWars Tournaments. Save $300 thru 11/18

Webcasts

To attend this webcast, login to your SANS Account or create your Account.

This webcast has been archived. To view the webcast login into your SANS Portal Account or create an account by clicking the "Get Registered" button on the right. Once you register, you can download the presentation slides below.

SANS CyberCast - SANS@Mic -Attacking Serverless Servers: Reverse Engineering the AWS, Azure, and GCP Function Runtimes

  • Wednesday, March 25, 2020 at 8:30 PM EDT (2020-03-26 00:30:00 UTC)
  • Brandon Evans

You can now attend the webcast using your mobile device!

  

Overview

The cloud makes it easy for developers to launch their applications, integrate with managed services, and think little about the underlying infrastructure. Unfortunately, this can and has come back to bite us. Last year's Capital One breach has made security professionals all too aware of the internal details of AWS, such as the EC2 Instance Metadata Service, which allowed a malicious actor to steal credentials for an IAM role that enabled them to pilfer documents from countless S3 buckets. The serverless ecosystem is no different. In order to give our functions access to the cloud services they need, the cloud provider needs to provide them with the necessary credentials. If a function's runtime is owned, so are these credentials. This presentation will explain how a compromised serverless function can be used to exfiltrate sensitive data, persist malware, gain powerful credentials, and pivot to other cloud services. It will contain live demonstrations of creating and exploiting reverse shell connections for AWS Lambda, Azure Functions, and Google Cloud Functions. These malicious functions and associated research have been published on GitHub by Brandon Evans and Eric Johnson under a repository called "Serverless Prey" (https://github.com/pumasecurity/serverless-prey).

Speaker Bio

Brandon Evans

Brandon is a Senior Application Security Engineer at Asurion, where he provides security services for thousands of his coworkers in product development across several global sites responsible for hundreds of web applications. As an application developer for most of his professional career, he moved into security full-time largely because of his many formal trainings through SANS. Brandon is lead author for the new SEC510: Multicloud Security Assessment and Defense and a contributor and instructor for SEC540: Cloud Security and DevOps Automation.  Throughout his security journey, Brandon has earned five GIAC certifications - GSEC, GSSP-JAVA, GWAPT, GPEN, and most recently, the GCSA. He holds a Bachelor's Degree in Computer Science from Binghamton University, where in his senior year, Brandon won the “Best Use of the SendGrid API” at the HackBU Hackathon. Additionally, he has won four Security Innovation Capture the Flag events, also placing second at their CTF at DEF CON 27, and in 2017 Brandon won the Asurion Hackathon for making an Alexa skill for cellphone support. Brandon taught the first ever cohort at the Vanderbilt University Web Development Coding Bootcamp in 2019, and he’s a contributor to the OWASP Serverless Top 10 Project.

To learn more about Brandon, read his full bio here: https://www.sans.org/profiles/brandon-evans/

Need Help? Visit our FAQ page or email webcast-support@sans.org.

Not able to attend a SANS webcast? All Webcasts are archived so you may view and listen at a time convenient to your schedule. View our webcast archive and access webcast recordings/PDF slides.