Living Off the Cloud: Abusing Cloud Services for Red Teaming | Cyber Codex

Introduction: Blending into the Digital Skyline
Why it Works
Red Teaming Use Cases
Command and Control via Google Drive or Dropbox
TTP Flow:
Tools:
Slack or Microsoft Teams as C2 Channels
Payload Hosting via GitHub Repositories
Persistence via Cloud Functions
Blue Teams: Defending Against LOTC
Monitor for Anomalous Cloud Services
Inspect DNS and HTTPs Metadata
Logs Everything You Can
Analyze DNS + HTTPS Metadata

CVEs, Zero-days, and weaknesses Enabling LOTC

Future of LOTC: AI-Enhaned Attacks?
Try it Yourself
PreviousJWT Warfare: Obfuscation, Cracking, and Red Team Exploits | Cyber CodexNextUltimate Technical Breakdown of the MITRE Ecosystem | Cyber Codex
Last updated
Was this helpful?
