Hacking in the Cloud - vulnerable_lambda

Hacking in the Cloud - vulnerable_lambda

in

This is the first scenario in the CloudGoat series. We start off as a low-privileged user that can assume a role which gives Lambda:Invoke permissions. Using this permission we are able to exploit a high-privileged Lambda function via an SQL injection and obtain Administrator access.


00:00 - Video context
00:57 - Enumerating IAM roles and policies
06:53 - Assuming lambda role
08:53 - Further enumeration of IAM roles
14:51 - Analyzing vulnerable lambda’s source code
18:19 - Exploiting lambda function
24:17 - Demonstrating SQLi