Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21
Introduction
00:00 • 2min
Hacking the AWS Cloud
02:23 • 2min
Cloud Security Research - Pen Testing?
04:16 • 2min
AWS Security Research
05:55 • 3min
AWS AppSync - Confusion Deputy Wonderability
08:52 • 3min
The Gravity of Cross Account Vulnerabilities in AWS
12:09 • 2min
AWS - Is There a Framework for Detective Controls?
14:22 • 2min
How Long Should You Wait Before Disclosing a Vulnerability?
16:03 • 2min
Cloud Service Providers - What's the Best Line of Responsibility?
18:07 • 2min
Cloud Security Research - Is There a Common Attack Technique?
19:48 • 2min
AWS Security Podcast - Is There a Common Reliability Misconfiguration?
22:14 • 2min
IMDSV Two Versus Version Two
23:53 • 3min
Is It Possible to Add an MTIM Role to an EC2 Instance?
27:01 • 3min
Hacking the Cloud - What's It All About?
29:53 • 2min
Cloud Security Researcher
31:24 • 2min
Hacking to the Cloud - Is There a Toolbox?
33:07 • 2min
How Do I Get Into AWS Cloud Service Internals?
35:25 • 3min
AWS Cloud Security Lab
38:20 • 2min
What's the Biggest Thing About Cloud Computing?
39:59 • 2min
What Are Your Focus Areas of Research in 2023?
41:41 • 2min
Breaking the AWS Cloud Month - Episode 2023
43:51 • 2min