The document discusses cloud pentesting techniques. It provides an agenda for a cloud pentesting training session that includes an introduction to cloud computing, the major cloud vendors and their product offerings, differences between cloud and conventional pentesting, exploring attack surfaces in Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). It discusses techniques such as exploiting metadata APIs, abusing cloud storage, attacking identity and access management services. The document also contains disclaimers and information about the speaker.
Related topics: