Disclaimer

Disclaimer

The postings on this site are my own and do not represent the postings, strategies or opinions of my employer.
The shared tools are intended for testing and demonstration purposes only!

The CVX concept

Concept

The CVX concept comes from the challenge to better identify cloud vulnerabilities, as is done with CVEs at OS level.

Statistics suggest that approximately 60% of the world’s corporate data is stored in the cloud, and global cloud infrastructure spending is expected to reach $118 billion by 2025. With a near 50% of critical assets included in that percentage.
On top of that, here are some cloud security statistics showing that the whole above cybersphere is one click and misconfiguration away from abuse.

In this blog, we will be exposing some fun misconfiration issues and bypasses in cloud infrastructures as CVXs.
The fun part here will be to focus only, whenever possible, on cloud confuse deputy problems for exploits.

Vulns

Vulns \

aws cvx identificators

azure cvx identificators

gcp cvx identificators

Xploits

Xploits \

"…brothers fighting brothers, dragons killing dragons…"
"…clouds pwning clouds…"

arrax attacks

  • Content
    Automated initial credentials access.

vhagar attacks

  • Content
    Automated backdoor via malicious trusted identities (IDentity Providers, trusted identities to assume roles,…).

vermithor attacks

  • Content
    Automated backdoor through cross accounts/subscritpions/projects abusing of cloud storage, port mirroring, private endpoints,… cloud native features.