Making Alexa Do Your Dirty Work - Improving Your Toolkit with Serverless Computing

Presented at CackalackyCon 1 (2019), June 2, 2019, 4 p.m. (60 minutes)

During Red Team engagements it is important to be able to quickly deploy resources (c2 infrastructure, payloads, phishing pretexts, etc) that are independent of each other in order to reduce the chances of getting detected simply by the attribution of related infrastructure. This typically also requires the procurement of established (categorized) domains which can be difficult to obtain. On the other side of the fence, an Incident Response Team’s activity can be fingerprinted by attackers due to the observable patterns and reuse of scripted analysis tools. This talk will demonstrate how addition of serverless cloud computing can solve the aforementioned problems, and add an immediate benefit to an Infosec Practitioners toolkit (both Red and Blue). Detailed examples will be provided (including source code) showing how serverless functions can be used to perform tasks like using nmap to scan a target, exploiting a SQLi vulnerability with sqlmap, automating malware analysis, and much more - all while avoiding the need to reuse (and maintain) long term infrastructure.


Presenters:

Links:

Similar Presentations: