尊敬的 微信汇率:1円 ≈ 0.046239 元 支付宝汇率:1円 ≈ 0.04633元 [退出登录]
SlideShare a Scribd company logo
Serverless Siege:
AWS Lambda Pentesting
By:
Divyanshu Shukla & Anjali Shukla
I am Anjali Shukla
Senior Security Consultant @
NotSoSecure
4+ years of experience in Cloud security, DevSecOps,
CI/CD, IAC.
Trainer/Speaker: Bsides Bangalore, Null Bangalore,
Blackhat, Crew Member at Defcon Cloudvillage.
Hello!
2
I am Divyanshu Shukla
6+ years of experience in bugbounty, pentesting,
cloud security and secure coding review.
Acknowledged by Airbnb, Google, Microsoft, Apple,
Samsung, Opera, AWS, Amazon, Mozilla.
Trainer at Nullcon & Bsides, Crew Member at Defcon
Cloudvillage & AWS Community Builder
Hello!
3
We will look at:
• AWS SERVERLESS INTRODUCTION
• SERVERLESS ARCHITECTURE
• PERSISTENCE
• CHALLENGE IN LAMBDA PENTESTING
• OWASP TOP 10 SERVERLESS
• DEMO
• REMEDIATION
4
FUNCTION AS A SERVICE (FAAS) IN
SERVERLESS
FaaS is a category of cloud services allowing customers to develop,
run, and manage application functionalities without the complexity of
building and maintaining the infrastructure.
FaaS is the core of any serverless architecture, where developers
can run their code in response to events.
Examples of FaaS include AWS Lambda, Azure Functions, and Google
Cloud Functions.
5
SERVERLESS ARCHITECTURE
6
SERVERLESS IN CLOUD
7
WHAT ABOUT PERSISTENCE?
• Read-Only FS on
/var/task in AWS
• Ephemeral Disk -
/tmp/ (cached in
memory across
executions) in AWS
• Read-Only FS on
/home/site/wwwroot
in with ephemeral
Disk - D:localTemp
in Azure
• Read-Only FS in the
function's
deployment package
in GCP with
ephemeral Disk -
/tmp
8
SERVERLESS SECURITY
9
WHAT DOES AN ATTACKER SEE?
◉ A HTTP endpoint (web application) with
parameters, input and output
10
CHALLENGES IN LAMBDA
PENTESTING
◉ Limited visibility
◉ Configuration management
◉ Scaling
◉ Third-party dependencies
◉ Event-Driven
11
OWASP TOP 10
SERVERLESS
◉ A1: Injection
◉ A2: Broken Authentication
◉ A3: Sensitive Data Exposure
◉ A4: XML External Entities (XXE)
◉ A5: Broken Access Control
◉ A6: Security Misconfiguration
12
OWASP TOP 10
SERVERLESS 2017
◉ A7: Cross-Site Scripting (XSS)
◉ A8: Insecure Deserialization
◉ A9: Using Components with Known Vulnerabilities
◉ A10: Insufficient Logging and Monitoring
13
github.com/justmorpheus/very-vulnerable-
serverless
Defence & Monitoring AWS
Serverless
API Gateway Security
Scalability and Concurrency
Logging and Audit - Cloudtrail & Xray
Intelligent Threat Detection - Amazon GuardDuty
Enable Billing Alerts For Lambda
CSPM Solutions
15
OWASP TOP 10 &
REMEDIATION
• A1: Injection - Use prepared statements, parameterized
queries, or stored procedures to mitigate SQL and other
injection attacks.
• A2: Broken Authentication - Implement multi-factor
authentication and session management (AWS Cognito),
ensuring secure password policies.
• A3: Sensitive Data Exposure - Use encryption at rest and in
transit, and don't store sensitive data unnecessarily.
16
OWASP TOP 10 &
REMEDIATION
• A4: XML External Entities (XXE) - Disable external entity
processing in XML parsers to prevent XXE attacks.
• A5: Broken Access Control - Implement Role-Based Access
Control (RBAC) and always enforce the principle of least
privilege.
• A6: Security Misconfiguration - Regularly update and harden
your systems, and employ automated scanners to detect
misconfigurations or vulnerabilities.
17
OWASP TOP 10 &
REMEDIATION
• A7: Cross-Site Scripting (XSS) - Use output encoding and escaping
appropriate to prevent XSS attacks.
• A8: Insecure Deserialization - Validate and sanitize input & avoid
deserializing objects from untrusted sources.
• A9: Using Components with Known Vulnerabilities - Keep
components updated
• A10: Insufficient Logging and Monitoring - Implement extensive
logging and real-time alerting.
18
SERVERLESS PENTESTING
MINDMAP
19
Any questions ?
You can find us at
◉ /@infosecblo55om​ | /in/singhanjali94
◉ /@justm0rph3u5
Thanks!
20

More Related Content

What's hot

Sigma and YARA Rules
Sigma and YARA RulesSigma and YARA Rules
Sigma and YARA Rules
Lionel Faleiro
 
DevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to SecurityDevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to Security
Alert Logic
 
Application Security
Application SecurityApplication Security
Application Security
Reggie Niccolo Santos
 
Building an Analytics Enables SOC
Building an Analytics Enables SOCBuilding an Analytics Enables SOC
Building an Analytics Enables SOC
Splunk
 
Software Composition Analysis Deep Dive
Software Composition Analysis Deep DiveSoftware Composition Analysis Deep Dive
Software Composition Analysis Deep Dive
Ulisses Albuquerque
 
Secure Code Review 101
Secure Code Review 101Secure Code Review 101
Secure Code Review 101
Narudom Roongsiriwong, CISSP
 
[DevSecOps Live] DevSecOps: Challenges and Opportunities
[DevSecOps Live] DevSecOps: Challenges and Opportunities[DevSecOps Live] DevSecOps: Challenges and Opportunities
[DevSecOps Live] DevSecOps: Challenges and Opportunities
Mohammed A. Imran
 
2019 DevSecOps Reference Architectures
2019 DevSecOps Reference Architectures2019 DevSecOps Reference Architectures
2019 DevSecOps Reference Architectures
Sonatype
 
OWASP Mobile Top 10
OWASP Mobile Top 10OWASP Mobile Top 10
OWASP Mobile Top 10
NowSecure
 
Security Testing Mobile Applications
Security Testing Mobile ApplicationsSecurity Testing Mobile Applications
Security Testing Mobile Applications
Denim Group
 
Secure code practices
Secure code practicesSecure code practices
Secure code practices
Hina Rawal
 
Elastic SIEM (Endpoint Security)
Elastic SIEM (Endpoint Security)Elastic SIEM (Endpoint Security)
Elastic SIEM (Endpoint Security)
Kangaroot
 
SACON - Threat hunting (Chandra Prakash)
SACON - Threat hunting (Chandra Prakash)SACON - Threat hunting (Chandra Prakash)
SACON - Threat hunting (Chandra Prakash)
Priyanka Aash
 
Introduction To OWASP
Introduction To OWASPIntroduction To OWASP
Introduction To OWASP
Marco Morana
 
Security champions v1.0
Security champions v1.0Security champions v1.0
Security champions v1.0
Dinis Cruz
 
DevSecOps 101
DevSecOps 101DevSecOps 101
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
Amazon Web Services
 
Threat Modeling Using STRIDE
Threat Modeling Using STRIDEThreat Modeling Using STRIDE
Threat Modeling Using STRIDE
Girindro Pringgo Digdo
 
Benefits of Web Application Firewall
Benefits of Web Application FirewallBenefits of Web Application Firewall
Benefits of Web Application Firewall
davidjohnrace
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
Ishan Girdhar
 

What's hot (20)

Sigma and YARA Rules
Sigma and YARA RulesSigma and YARA Rules
Sigma and YARA Rules
 
DevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to SecurityDevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to Security
 
Application Security
Application SecurityApplication Security
Application Security
 
Building an Analytics Enables SOC
Building an Analytics Enables SOCBuilding an Analytics Enables SOC
Building an Analytics Enables SOC
 
Software Composition Analysis Deep Dive
Software Composition Analysis Deep DiveSoftware Composition Analysis Deep Dive
Software Composition Analysis Deep Dive
 
Secure Code Review 101
Secure Code Review 101Secure Code Review 101
Secure Code Review 101
 
[DevSecOps Live] DevSecOps: Challenges and Opportunities
[DevSecOps Live] DevSecOps: Challenges and Opportunities[DevSecOps Live] DevSecOps: Challenges and Opportunities
[DevSecOps Live] DevSecOps: Challenges and Opportunities
 
2019 DevSecOps Reference Architectures
2019 DevSecOps Reference Architectures2019 DevSecOps Reference Architectures
2019 DevSecOps Reference Architectures
 
OWASP Mobile Top 10
OWASP Mobile Top 10OWASP Mobile Top 10
OWASP Mobile Top 10
 
Security Testing Mobile Applications
Security Testing Mobile ApplicationsSecurity Testing Mobile Applications
Security Testing Mobile Applications
 
Secure code practices
Secure code practicesSecure code practices
Secure code practices
 
Elastic SIEM (Endpoint Security)
Elastic SIEM (Endpoint Security)Elastic SIEM (Endpoint Security)
Elastic SIEM (Endpoint Security)
 
SACON - Threat hunting (Chandra Prakash)
SACON - Threat hunting (Chandra Prakash)SACON - Threat hunting (Chandra Prakash)
SACON - Threat hunting (Chandra Prakash)
 
Introduction To OWASP
Introduction To OWASPIntroduction To OWASP
Introduction To OWASP
 
Security champions v1.0
Security champions v1.0Security champions v1.0
Security champions v1.0
 
DevSecOps 101
DevSecOps 101DevSecOps 101
DevSecOps 101
 
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
 
Threat Modeling Using STRIDE
Threat Modeling Using STRIDEThreat Modeling Using STRIDE
Threat Modeling Using STRIDE
 
Benefits of Web Application Firewall
Benefits of Web Application FirewallBenefits of Web Application Firewall
Benefits of Web Application Firewall
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 

Similar to Serverless Siege: AWS Lambda Pentesting - OWASP Top 10 Serverless C0c0n 2023

AWS Security and SecOps
AWS Security and SecOpsAWS Security and SecOps
AWS Security and SecOps
Shiva Narayanaswamy
 
Security and Compliance in the Cloud
Security and Compliance in the Cloud Security and Compliance in the Cloud
Security and Compliance in the Cloud
Amazon Web Services
 
Azure Boot Camp 21.04.2018 SQL Server in Azure Iaas PaaS on-prem Lars Platzdasch
Azure Boot Camp 21.04.2018 SQL Server in Azure Iaas PaaS on-prem Lars PlatzdaschAzure Boot Camp 21.04.2018 SQL Server in Azure Iaas PaaS on-prem Lars Platzdasch
Azure Boot Camp 21.04.2018 SQL Server in Azure Iaas PaaS on-prem Lars Platzdasch
Lars Platzdasch
 
New Serverless World - Cloud Native Apps
New Serverless World - Cloud Native AppsNew Serverless World - Cloud Native Apps
New Serverless World - Cloud Native Apps
Haufe-Lexware GmbH & Co KG
 
New Serverless World, Cloud Native Apps
New Serverless World, Cloud Native AppsNew Serverless World, Cloud Native Apps
New Serverless World, Cloud Native Apps
Melania Andrisan (Danciu)
 
Using AWS Well Architectured Framework for Software Architecture Evaluations ...
Using AWS Well Architectured Framework for Software Architecture Evaluations ...Using AWS Well Architectured Framework for Software Architecture Evaluations ...
Using AWS Well Architectured Framework for Software Architecture Evaluations ...
Alexandr Savchenko
 
Whizlabs webinar - Deploying Portfolio Site with AWS Serverless
Whizlabs webinar - Deploying Portfolio Site with AWS ServerlessWhizlabs webinar - Deploying Portfolio Site with AWS Serverless
Whizlabs webinar - Deploying Portfolio Site with AWS Serverless
Dhaval Nagar
 
Application Lifecycle Management on AWS
Application Lifecycle Management on AWSApplication Lifecycle Management on AWS
Application Lifecycle Management on AWS
David Mat
 
How to implement data encryption at rest in compliance with enterprise requir...
How to implement data encryption at rest in compliance with enterprise requir...How to implement data encryption at rest in compliance with enterprise requir...
How to implement data encryption at rest in compliance with enterprise requir...
Steffen Mazanek
 
Serverless is not Cloudless - Serverless Security in AWS & AWS funds for Star...
Serverless is not Cloudless - Serverless Security in AWS & AWS funds for Star...Serverless is not Cloudless - Serverless Security in AWS & AWS funds for Star...
Serverless is not Cloudless - Serverless Security in AWS & AWS funds for Star...
Daniel Zivkovic
 
Deep-Dive: Secure API Management
Deep-Dive: Secure API ManagementDeep-Dive: Secure API Management
Deep-Dive: Secure API Management
Apigee | Google Cloud
 
Serverless Pune Meetup 1
Serverless Pune Meetup 1Serverless Pune Meetup 1
Serverless Pune Meetup 1
Vishal Biyani
 
Innovation at Scale - Top 10 AWS questions when you start
Innovation at Scale - Top 10 AWS questions when you startInnovation at Scale - Top 10 AWS questions when you start
Innovation at Scale - Top 10 AWS questions when you start
Shiva Narayanaswamy
 
Azure DevOps Engineer Roadmap PDF By Scholarhat.pdf
Azure DevOps Engineer Roadmap PDF By Scholarhat.pdfAzure DevOps Engineer Roadmap PDF By Scholarhat.pdf
Azure DevOps Engineer Roadmap PDF By Scholarhat.pdf
Scholarhat
 
ADDO 2022 Putting the Sec in DevSecOps for an AWS Lambda Based System
ADDO 2022 Putting the Sec in DevSecOps for an AWS Lambda Based SystemADDO 2022 Putting the Sec in DevSecOps for an AWS Lambda Based System
ADDO 2022 Putting the Sec in DevSecOps for an AWS Lambda Based System
Craeg Strong
 
ServerlessConf Tokyo キーノート
ServerlessConf Tokyo キーノートServerlessConf Tokyo キーノート
ServerlessConf Tokyo キーノート
Amazon Web Services Japan
 
HA With AWS OpsWorks
HA With AWS OpsWorksHA With AWS OpsWorks
HA With AWS OpsWorks
Shane Davis
 
How to implement DevSecOps on AWS for startups
How to implement DevSecOps on AWS for startupsHow to implement DevSecOps on AWS for startups
How to implement DevSecOps on AWS for startups
Aleksandr Maklakov
 
SecDevOps for API Security
SecDevOps for API SecuritySecDevOps for API Security
SecDevOps for API Security
42Crunch
 
Dallas Breakfast Seminar
Dallas Breakfast SeminarDallas Breakfast Seminar
Dallas Breakfast Seminar
NuoDB
 

Similar to Serverless Siege: AWS Lambda Pentesting - OWASP Top 10 Serverless C0c0n 2023 (20)

AWS Security and SecOps
AWS Security and SecOpsAWS Security and SecOps
AWS Security and SecOps
 
Security and Compliance in the Cloud
Security and Compliance in the Cloud Security and Compliance in the Cloud
Security and Compliance in the Cloud
 
Azure Boot Camp 21.04.2018 SQL Server in Azure Iaas PaaS on-prem Lars Platzdasch
Azure Boot Camp 21.04.2018 SQL Server in Azure Iaas PaaS on-prem Lars PlatzdaschAzure Boot Camp 21.04.2018 SQL Server in Azure Iaas PaaS on-prem Lars Platzdasch
Azure Boot Camp 21.04.2018 SQL Server in Azure Iaas PaaS on-prem Lars Platzdasch
 
New Serverless World - Cloud Native Apps
New Serverless World - Cloud Native AppsNew Serverless World - Cloud Native Apps
New Serverless World - Cloud Native Apps
 
New Serverless World, Cloud Native Apps
New Serverless World, Cloud Native AppsNew Serverless World, Cloud Native Apps
New Serverless World, Cloud Native Apps
 
Using AWS Well Architectured Framework for Software Architecture Evaluations ...
Using AWS Well Architectured Framework for Software Architecture Evaluations ...Using AWS Well Architectured Framework for Software Architecture Evaluations ...
Using AWS Well Architectured Framework for Software Architecture Evaluations ...
 
Whizlabs webinar - Deploying Portfolio Site with AWS Serverless
Whizlabs webinar - Deploying Portfolio Site with AWS ServerlessWhizlabs webinar - Deploying Portfolio Site with AWS Serverless
Whizlabs webinar - Deploying Portfolio Site with AWS Serverless
 
Application Lifecycle Management on AWS
Application Lifecycle Management on AWSApplication Lifecycle Management on AWS
Application Lifecycle Management on AWS
 
How to implement data encryption at rest in compliance with enterprise requir...
How to implement data encryption at rest in compliance with enterprise requir...How to implement data encryption at rest in compliance with enterprise requir...
How to implement data encryption at rest in compliance with enterprise requir...
 
Serverless is not Cloudless - Serverless Security in AWS & AWS funds for Star...
Serverless is not Cloudless - Serverless Security in AWS & AWS funds for Star...Serverless is not Cloudless - Serverless Security in AWS & AWS funds for Star...
Serverless is not Cloudless - Serverless Security in AWS & AWS funds for Star...
 
Deep-Dive: Secure API Management
Deep-Dive: Secure API ManagementDeep-Dive: Secure API Management
Deep-Dive: Secure API Management
 
Serverless Pune Meetup 1
Serverless Pune Meetup 1Serverless Pune Meetup 1
Serverless Pune Meetup 1
 
Innovation at Scale - Top 10 AWS questions when you start
Innovation at Scale - Top 10 AWS questions when you startInnovation at Scale - Top 10 AWS questions when you start
Innovation at Scale - Top 10 AWS questions when you start
 
Azure DevOps Engineer Roadmap PDF By Scholarhat.pdf
Azure DevOps Engineer Roadmap PDF By Scholarhat.pdfAzure DevOps Engineer Roadmap PDF By Scholarhat.pdf
Azure DevOps Engineer Roadmap PDF By Scholarhat.pdf
 
ADDO 2022 Putting the Sec in DevSecOps for an AWS Lambda Based System
ADDO 2022 Putting the Sec in DevSecOps for an AWS Lambda Based SystemADDO 2022 Putting the Sec in DevSecOps for an AWS Lambda Based System
ADDO 2022 Putting the Sec in DevSecOps for an AWS Lambda Based System
 
ServerlessConf Tokyo キーノート
ServerlessConf Tokyo キーノートServerlessConf Tokyo キーノート
ServerlessConf Tokyo キーノート
 
HA With AWS OpsWorks
HA With AWS OpsWorksHA With AWS OpsWorks
HA With AWS OpsWorks
 
How to implement DevSecOps on AWS for startups
How to implement DevSecOps on AWS for startupsHow to implement DevSecOps on AWS for startups
How to implement DevSecOps on AWS for startups
 
SecDevOps for API Security
SecDevOps for API SecuritySecDevOps for API Security
SecDevOps for API Security
 
Dallas Breakfast Seminar
Dallas Breakfast SeminarDallas Breakfast Seminar
Dallas Breakfast Seminar
 

Recently uploaded

Impartiality as per ISO /IEC 17025:2017 Standard
Impartiality as per ISO /IEC 17025:2017 StandardImpartiality as per ISO /IEC 17025:2017 Standard
Impartiality as per ISO /IEC 17025:2017 Standard
MuhammadJazib15
 
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...
Dr.Costas Sachpazis
 
SPICE PARK JUL2024 ( 6,866 SPICE Models )
SPICE PARK JUL2024 ( 6,866 SPICE Models )SPICE PARK JUL2024 ( 6,866 SPICE Models )
SPICE PARK JUL2024 ( 6,866 SPICE Models )
Tsuyoshi Horigome
 
Lateral load-resisting systems in buildings.pptx
Lateral load-resisting systems in buildings.pptxLateral load-resisting systems in buildings.pptx
Lateral load-resisting systems in buildings.pptx
DebendraDevKhanal1
 
Sri Guru Hargobind Ji - Bandi Chor Guru.pdf
Sri Guru Hargobind Ji - Bandi Chor Guru.pdfSri Guru Hargobind Ji - Bandi Chor Guru.pdf
Sri Guru Hargobind Ji - Bandi Chor Guru.pdf
Balvir Singh
 
Update 40 models( Solar Cell ) in SPICE PARK(JUL2024)
Update 40 models( Solar Cell ) in SPICE PARK(JUL2024)Update 40 models( Solar Cell ) in SPICE PARK(JUL2024)
Update 40 models( Solar Cell ) in SPICE PARK(JUL2024)
Tsuyoshi Horigome
 
🔥Young College Call Girls Chandigarh 💯Call Us 🔝 7737669865 🔝💃Independent Chan...
🔥Young College Call Girls Chandigarh 💯Call Us 🔝 7737669865 🔝💃Independent Chan...🔥Young College Call Girls Chandigarh 💯Call Us 🔝 7737669865 🔝💃Independent Chan...
🔥Young College Call Girls Chandigarh 💯Call Us 🔝 7737669865 🔝💃Independent Chan...
sonamrawat5631
 
🔥Photo Call Girls Lucknow 💯Call Us 🔝 6350257716 🔝💃Independent Lucknow Escorts...
🔥Photo Call Girls Lucknow 💯Call Us 🔝 6350257716 🔝💃Independent Lucknow Escorts...🔥Photo Call Girls Lucknow 💯Call Us 🔝 6350257716 🔝💃Independent Lucknow Escorts...
🔥Photo Call Girls Lucknow 💯Call Us 🔝 6350257716 🔝💃Independent Lucknow Escorts...
AK47
 
Call Girls Nagpur 8824825030 Escort In Nagpur service 24X7
Call Girls Nagpur 8824825030 Escort In Nagpur service 24X7Call Girls Nagpur 8824825030 Escort In Nagpur service 24X7
Call Girls Nagpur 8824825030 Escort In Nagpur service 24X7
sexytaniya455
 
Literature review for prompt engineering of ChatGPT.pptx
Literature review for prompt engineering of ChatGPT.pptxLiterature review for prompt engineering of ChatGPT.pptx
Literature review for prompt engineering of ChatGPT.pptx
LokerXu2
 
INTRODUCTION TO ARTIFICIAL INTELLIGENCE BASIC
INTRODUCTION TO ARTIFICIAL INTELLIGENCE BASICINTRODUCTION TO ARTIFICIAL INTELLIGENCE BASIC
INTRODUCTION TO ARTIFICIAL INTELLIGENCE BASIC
GOKULKANNANMMECLECTC
 
Introduction to Artificial Intelligence.
Introduction to Artificial Intelligence.Introduction to Artificial Intelligence.
Introduction to Artificial Intelligence.
supriyaDicholkar1
 
TENDERS and Contracts basic syllabus for engineering
TENDERS and Contracts basic syllabus for engineeringTENDERS and Contracts basic syllabus for engineering
TENDERS and Contracts basic syllabus for engineering
SnehalChavan75
 
An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...
An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...
An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...
DharmaBanothu
 
MODULE 5 BIOLOGY FOR ENGINEERS TRENDS IN BIO ENGINEERING.pptx
MODULE 5 BIOLOGY FOR ENGINEERS TRENDS IN BIO ENGINEERING.pptxMODULE 5 BIOLOGY FOR ENGINEERS TRENDS IN BIO ENGINEERING.pptx
MODULE 5 BIOLOGY FOR ENGINEERS TRENDS IN BIO ENGINEERING.pptx
NaveenNaveen726446
 
Mahipalpur Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with 1...
Mahipalpur Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with 1...Mahipalpur Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with 1...
Mahipalpur Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with 1...
simrangupta87541
 
Call Girls Goa (india) ☎️ +91-7426014248 Goa Call Girl
Call Girls Goa (india) ☎️ +91-7426014248 Goa Call GirlCall Girls Goa (india) ☎️ +91-7426014248 Goa Call Girl
Call Girls Goa (india) ☎️ +91-7426014248 Goa Call Girl
sapna sharmap11
 
🚺ANJALI MEHTA High Profile Call Girls Ahmedabad 💯Call Us 🔝 9352988975 🔝💃Top C...
🚺ANJALI MEHTA High Profile Call Girls Ahmedabad 💯Call Us 🔝 9352988975 🔝💃Top C...🚺ANJALI MEHTA High Profile Call Girls Ahmedabad 💯Call Us 🔝 9352988975 🔝💃Top C...
🚺ANJALI MEHTA High Profile Call Girls Ahmedabad 💯Call Us 🔝 9352988975 🔝💃Top C...
dulbh kashyap
 
BBOC407 Module 1.pptx Biology for Engineers
BBOC407  Module 1.pptx Biology for EngineersBBOC407  Module 1.pptx Biology for Engineers
BBOC407 Module 1.pptx Biology for Engineers
sathishkumars808912
 
Cuttack Call Girls 💯Call Us 🔝 7374876321 🔝 💃 Independent Female Escort Service
Cuttack Call Girls 💯Call Us 🔝 7374876321 🔝 💃 Independent Female Escort ServiceCuttack Call Girls 💯Call Us 🔝 7374876321 🔝 💃 Independent Female Escort Service
Cuttack Call Girls 💯Call Us 🔝 7374876321 🔝 💃 Independent Female Escort Service
yakranividhrini
 

Recently uploaded (20)

Impartiality as per ISO /IEC 17025:2017 Standard
Impartiality as per ISO /IEC 17025:2017 StandardImpartiality as per ISO /IEC 17025:2017 Standard
Impartiality as per ISO /IEC 17025:2017 Standard
 
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...
 
SPICE PARK JUL2024 ( 6,866 SPICE Models )
SPICE PARK JUL2024 ( 6,866 SPICE Models )SPICE PARK JUL2024 ( 6,866 SPICE Models )
SPICE PARK JUL2024 ( 6,866 SPICE Models )
 
Lateral load-resisting systems in buildings.pptx
Lateral load-resisting systems in buildings.pptxLateral load-resisting systems in buildings.pptx
Lateral load-resisting systems in buildings.pptx
 
Sri Guru Hargobind Ji - Bandi Chor Guru.pdf
Sri Guru Hargobind Ji - Bandi Chor Guru.pdfSri Guru Hargobind Ji - Bandi Chor Guru.pdf
Sri Guru Hargobind Ji - Bandi Chor Guru.pdf
 
Update 40 models( Solar Cell ) in SPICE PARK(JUL2024)
Update 40 models( Solar Cell ) in SPICE PARK(JUL2024)Update 40 models( Solar Cell ) in SPICE PARK(JUL2024)
Update 40 models( Solar Cell ) in SPICE PARK(JUL2024)
 
🔥Young College Call Girls Chandigarh 💯Call Us 🔝 7737669865 🔝💃Independent Chan...
🔥Young College Call Girls Chandigarh 💯Call Us 🔝 7737669865 🔝💃Independent Chan...🔥Young College Call Girls Chandigarh 💯Call Us 🔝 7737669865 🔝💃Independent Chan...
🔥Young College Call Girls Chandigarh 💯Call Us 🔝 7737669865 🔝💃Independent Chan...
 
🔥Photo Call Girls Lucknow 💯Call Us 🔝 6350257716 🔝💃Independent Lucknow Escorts...
🔥Photo Call Girls Lucknow 💯Call Us 🔝 6350257716 🔝💃Independent Lucknow Escorts...🔥Photo Call Girls Lucknow 💯Call Us 🔝 6350257716 🔝💃Independent Lucknow Escorts...
🔥Photo Call Girls Lucknow 💯Call Us 🔝 6350257716 🔝💃Independent Lucknow Escorts...
 
Call Girls Nagpur 8824825030 Escort In Nagpur service 24X7
Call Girls Nagpur 8824825030 Escort In Nagpur service 24X7Call Girls Nagpur 8824825030 Escort In Nagpur service 24X7
Call Girls Nagpur 8824825030 Escort In Nagpur service 24X7
 
Literature review for prompt engineering of ChatGPT.pptx
Literature review for prompt engineering of ChatGPT.pptxLiterature review for prompt engineering of ChatGPT.pptx
Literature review for prompt engineering of ChatGPT.pptx
 
INTRODUCTION TO ARTIFICIAL INTELLIGENCE BASIC
INTRODUCTION TO ARTIFICIAL INTELLIGENCE BASICINTRODUCTION TO ARTIFICIAL INTELLIGENCE BASIC
INTRODUCTION TO ARTIFICIAL INTELLIGENCE BASIC
 
Introduction to Artificial Intelligence.
Introduction to Artificial Intelligence.Introduction to Artificial Intelligence.
Introduction to Artificial Intelligence.
 
TENDERS and Contracts basic syllabus for engineering
TENDERS and Contracts basic syllabus for engineeringTENDERS and Contracts basic syllabus for engineering
TENDERS and Contracts basic syllabus for engineering
 
An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...
An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...
An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...
 
MODULE 5 BIOLOGY FOR ENGINEERS TRENDS IN BIO ENGINEERING.pptx
MODULE 5 BIOLOGY FOR ENGINEERS TRENDS IN BIO ENGINEERING.pptxMODULE 5 BIOLOGY FOR ENGINEERS TRENDS IN BIO ENGINEERING.pptx
MODULE 5 BIOLOGY FOR ENGINEERS TRENDS IN BIO ENGINEERING.pptx
 
Mahipalpur Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with 1...
Mahipalpur Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with 1...Mahipalpur Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with 1...
Mahipalpur Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with 1...
 
Call Girls Goa (india) ☎️ +91-7426014248 Goa Call Girl
Call Girls Goa (india) ☎️ +91-7426014248 Goa Call GirlCall Girls Goa (india) ☎️ +91-7426014248 Goa Call Girl
Call Girls Goa (india) ☎️ +91-7426014248 Goa Call Girl
 
🚺ANJALI MEHTA High Profile Call Girls Ahmedabad 💯Call Us 🔝 9352988975 🔝💃Top C...
🚺ANJALI MEHTA High Profile Call Girls Ahmedabad 💯Call Us 🔝 9352988975 🔝💃Top C...🚺ANJALI MEHTA High Profile Call Girls Ahmedabad 💯Call Us 🔝 9352988975 🔝💃Top C...
🚺ANJALI MEHTA High Profile Call Girls Ahmedabad 💯Call Us 🔝 9352988975 🔝💃Top C...
 
BBOC407 Module 1.pptx Biology for Engineers
BBOC407  Module 1.pptx Biology for EngineersBBOC407  Module 1.pptx Biology for Engineers
BBOC407 Module 1.pptx Biology for Engineers
 
Cuttack Call Girls 💯Call Us 🔝 7374876321 🔝 💃 Independent Female Escort Service
Cuttack Call Girls 💯Call Us 🔝 7374876321 🔝 💃 Independent Female Escort ServiceCuttack Call Girls 💯Call Us 🔝 7374876321 🔝 💃 Independent Female Escort Service
Cuttack Call Girls 💯Call Us 🔝 7374876321 🔝 💃 Independent Female Escort Service
 

Serverless Siege: AWS Lambda Pentesting - OWASP Top 10 Serverless C0c0n 2023

  • 1. Serverless Siege: AWS Lambda Pentesting By: Divyanshu Shukla & Anjali Shukla
  • 2. I am Anjali Shukla Senior Security Consultant @ NotSoSecure 4+ years of experience in Cloud security, DevSecOps, CI/CD, IAC. Trainer/Speaker: Bsides Bangalore, Null Bangalore, Blackhat, Crew Member at Defcon Cloudvillage. Hello! 2
  • 3. I am Divyanshu Shukla 6+ years of experience in bugbounty, pentesting, cloud security and secure coding review. Acknowledged by Airbnb, Google, Microsoft, Apple, Samsung, Opera, AWS, Amazon, Mozilla. Trainer at Nullcon & Bsides, Crew Member at Defcon Cloudvillage & AWS Community Builder Hello! 3
  • 4. We will look at: • AWS SERVERLESS INTRODUCTION • SERVERLESS ARCHITECTURE • PERSISTENCE • CHALLENGE IN LAMBDA PENTESTING • OWASP TOP 10 SERVERLESS • DEMO • REMEDIATION 4
  • 5. FUNCTION AS A SERVICE (FAAS) IN SERVERLESS FaaS is a category of cloud services allowing customers to develop, run, and manage application functionalities without the complexity of building and maintaining the infrastructure. FaaS is the core of any serverless architecture, where developers can run their code in response to events. Examples of FaaS include AWS Lambda, Azure Functions, and Google Cloud Functions. 5
  • 8. WHAT ABOUT PERSISTENCE? • Read-Only FS on /var/task in AWS • Ephemeral Disk - /tmp/ (cached in memory across executions) in AWS • Read-Only FS on /home/site/wwwroot in with ephemeral Disk - D:localTemp in Azure • Read-Only FS in the function's deployment package in GCP with ephemeral Disk - /tmp 8
  • 10. WHAT DOES AN ATTACKER SEE? ◉ A HTTP endpoint (web application) with parameters, input and output 10
  • 11. CHALLENGES IN LAMBDA PENTESTING ◉ Limited visibility ◉ Configuration management ◉ Scaling ◉ Third-party dependencies ◉ Event-Driven 11
  • 12. OWASP TOP 10 SERVERLESS ◉ A1: Injection ◉ A2: Broken Authentication ◉ A3: Sensitive Data Exposure ◉ A4: XML External Entities (XXE) ◉ A5: Broken Access Control ◉ A6: Security Misconfiguration 12
  • 13. OWASP TOP 10 SERVERLESS 2017 ◉ A7: Cross-Site Scripting (XSS) ◉ A8: Insecure Deserialization ◉ A9: Using Components with Known Vulnerabilities ◉ A10: Insufficient Logging and Monitoring 13
  • 15. Defence & Monitoring AWS Serverless API Gateway Security Scalability and Concurrency Logging and Audit - Cloudtrail & Xray Intelligent Threat Detection - Amazon GuardDuty Enable Billing Alerts For Lambda CSPM Solutions 15
  • 16. OWASP TOP 10 & REMEDIATION • A1: Injection - Use prepared statements, parameterized queries, or stored procedures to mitigate SQL and other injection attacks. • A2: Broken Authentication - Implement multi-factor authentication and session management (AWS Cognito), ensuring secure password policies. • A3: Sensitive Data Exposure - Use encryption at rest and in transit, and don't store sensitive data unnecessarily. 16
  • 17. OWASP TOP 10 & REMEDIATION • A4: XML External Entities (XXE) - Disable external entity processing in XML parsers to prevent XXE attacks. • A5: Broken Access Control - Implement Role-Based Access Control (RBAC) and always enforce the principle of least privilege. • A6: Security Misconfiguration - Regularly update and harden your systems, and employ automated scanners to detect misconfigurations or vulnerabilities. 17
  • 18. OWASP TOP 10 & REMEDIATION • A7: Cross-Site Scripting (XSS) - Use output encoding and escaping appropriate to prevent XSS attacks. • A8: Insecure Deserialization - Validate and sanitize input & avoid deserializing objects from untrusted sources. • A9: Using Components with Known Vulnerabilities - Keep components updated • A10: Insufficient Logging and Monitoring - Implement extensive logging and real-time alerting. 18
  • 20. Any questions ? You can find us at ◉ /@infosecblo55om​ | /in/singhanjali94 ◉ /@justm0rph3u5 Thanks! 20
  翻译: