You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
<!-- START doctoc generated TOC please keep comment here to allow auto update -->
2
-
<!-- DON'T EDIT THIS SECTION, INSTEAD RE-RUN doctoc TO UPDATE -->
3
-
**Table of Contents***generated with [DocToc](https://github.com/thlorenz/doctoc)*
4
-
5
-
-[WEEK 6 OUTLINE](#week-6-outline)
6
-
-[OBJECTIVES](#objectives)
7
-
-[AGENDA](#agenda)
8
-
-[BONUS LABS](#bonus-labs)
9
-
-[ASSIGNMENTS](#assignments)
10
-
11
-
<!-- END doctoc generated TOC please keep comment here to allow auto update -->
12
-
13
1
# WEEK 6: Rugged Sec
2
+
The Cloud introduces a new attack vector into our environment which needs to be well understood and mitigated. Techniques demonstrated this week will enable awareness to ways infrastructure can be abused by attackers.
14
3
15
4
## OBJECTIVES
16
5
- Account Takeovers
17
6
- Advanced cloud hacking techniques:
18
7
- Lateral movement
19
8
- Privilege escalation
20
9
21
-
## AGENDA
22
-
TIME | TOPIC
23
-
---|---
24
-
5 PM - 5:50 PM | Thinking Outside the Box
25
-
6 PM - 6:45 PM | Lab: Deploy vulnerable `Jenkins` or `JBOSS` & exploit via Java Deserialization
0 commit comments