5min chapter

Cloud Security Podcast cover image

Threat Hunting in AWS

Cloud Security Podcast

CHAPTER

Common Ivasion Technice Things to Look Out for in Trap Hunting

There are two things that are almost completely under your control as an attacker. The source ip address, and the usur agent. You can create a simple alarm by using v peering to log into subnets. And there's a sorcpwhic you wouldn't expect an attacker would be able to control. But that was one of the fine hings i had. I haven't seen many attackers really making use of it but why not? It is what is supplied by the user, by the club. So other common ivasion technice people should look out for in tread hunting.

00:00

Get the Snipd
podcast app

Unlock the knowledge in podcasts with the podcast player of the future.
App store bannerPlay store banner

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode

Save any
moment

Hear something you like? Tap your headphones to save it with AI-generated key takeaways

Share
& Export

Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode