ºÝºÝߣshows by User: BryanMcAninch / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: BryanMcAninch / Mon, 26 Sep 2022 20:26:52 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: BryanMcAninch Hacking the Global Financial System (For Fun and Profit) /BryanMcAninch/hacking-the-global-financial-system-for-fun-and-profit-253194139 htgfsffap-220926202652-f38be8d9
Abstract: With the emergence of a globalized economy, the global financial system has ostensibly become the world’s most powerful institutional network. Because of its far reaching geopolitical and socioeconomic impact, bad actors have continuously sought to undermine its integrity and capitalize on its esoteric framework. In recent years however, a fervent retail investor movement has emerged that utilizes crowdsourced investment tactics to advance financial justice. By applying the hacker mindset, we too can leverage the same tools and methods used by powerful institutional investors to minimize financial risks and level the financial playing field. Information is power.]]>

Abstract: With the emergence of a globalized economy, the global financial system has ostensibly become the world’s most powerful institutional network. Because of its far reaching geopolitical and socioeconomic impact, bad actors have continuously sought to undermine its integrity and capitalize on its esoteric framework. In recent years however, a fervent retail investor movement has emerged that utilizes crowdsourced investment tactics to advance financial justice. By applying the hacker mindset, we too can leverage the same tools and methods used by powerful institutional investors to minimize financial risks and level the financial playing field. Information is power.]]>
Mon, 26 Sep 2022 20:26:52 GMT /BryanMcAninch/hacking-the-global-financial-system-for-fun-and-profit-253194139 BryanMcAninch@slideshare.net(BryanMcAninch) Hacking the Global Financial System (For Fun and Profit) BryanMcAninch Abstract: With the emergence of a globalized economy, the global financial system has ostensibly become the world’s most powerful institutional network. Because of its far reaching geopolitical and socioeconomic impact, bad actors have continuously sought to undermine its integrity and capitalize on its esoteric framework. In recent years however, a fervent retail investor movement has emerged that utilizes crowdsourced investment tactics to advance financial justice. By applying the hacker mindset, we too can leverage the same tools and methods used by powerful institutional investors to minimize financial risks and level the financial playing field. Information is power. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/htgfsffap-220926202652-f38be8d9-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Abstract: With the emergence of a globalized economy, the global financial system has ostensibly become the world’s most powerful institutional network. Because of its far reaching geopolitical and socioeconomic impact, bad actors have continuously sought to undermine its integrity and capitalize on its esoteric framework. In recent years however, a fervent retail investor movement has emerged that utilizes crowdsourced investment tactics to advance financial justice. By applying the hacker mindset, we too can leverage the same tools and methods used by powerful institutional investors to minimize financial risks and level the financial playing field. Information is power.
Hacking the Global Financial System (For Fun and Profit) from Bryan McAninch
]]>
99 0 https://cdn.slidesharecdn.com/ss_thumbnails/htgfsffap-220926202652-f38be8d9-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
The FaaS and the Curiousâ„¢ /slideshow/the-faas-and-the-curious-101157367/101157367 thefaasandthecurious-180607162418
Despite Amazon’s diligent efforts to secure their Lambda FaaS platform, its intended ability to access a variety of resources and services can be abused for unintended results. This presentation explores the attack surface of the AWS Lambda FaaS platform and how it can be surreptitiously used to circumvent security controls. Specifically, it will demonstrate how to hijack and impersonate Lambda functions, gain persistent remote access to the AWS cloud environment, and reverse engineer the Lambda runtime environment itself.]]>

Despite Amazon’s diligent efforts to secure their Lambda FaaS platform, its intended ability to access a variety of resources and services can be abused for unintended results. This presentation explores the attack surface of the AWS Lambda FaaS platform and how it can be surreptitiously used to circumvent security controls. Specifically, it will demonstrate how to hijack and impersonate Lambda functions, gain persistent remote access to the AWS cloud environment, and reverse engineer the Lambda runtime environment itself.]]>
Thu, 07 Jun 2018 16:24:18 GMT /slideshow/the-faas-and-the-curious-101157367/101157367 BryanMcAninch@slideshare.net(BryanMcAninch) The FaaS and the Curious™ BryanMcAninch Despite Amazon’s diligent efforts to secure their Lambda FaaS platform, its intended ability to access a variety of resources and services can be abused for unintended results. This presentation explores the attack surface of the AWS Lambda FaaS platform and how it can be surreptitiously used to circumvent security controls. Specifically, it will demonstrate how to hijack and impersonate Lambda functions, gain persistent remote access to the AWS cloud environment, and reverse engineer the Lambda runtime environment itself. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/thefaasandthecurious-180607162418-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Despite Amazon’s diligent efforts to secure their Lambda FaaS platform, its intended ability to access a variety of resources and services can be abused for unintended results. This presentation explores the attack surface of the AWS Lambda FaaS platform and how it can be surreptitiously used to circumvent security controls. Specifically, it will demonstrate how to hijack and impersonate Lambda functions, gain persistent remote access to the AWS cloud environment, and reverse engineer the Lambda runtime environment itself.
The FaaS and the Curiousâ„¢ from Bryan McAninch
]]>
4332 3 https://cdn.slidesharecdn.com/ss_thumbnails/thefaasandthecurious-180607162418-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cloud Jackingâ„¢ /slideshow/cloud-jacking-95188913/95188913 cloudjacking-180427050858
Subdomain hijacking presents significant security risks to organizations. Everything from credential theft to phishing can be made possible with a few keystrokes and click of a mouse. This talk focuses on how these risks materialize within an AWS cloud environment, how to enumerate their existence, and options to quickly mitigate them.]]>

Subdomain hijacking presents significant security risks to organizations. Everything from credential theft to phishing can be made possible with a few keystrokes and click of a mouse. This talk focuses on how these risks materialize within an AWS cloud environment, how to enumerate their existence, and options to quickly mitigate them.]]>
Fri, 27 Apr 2018 05:08:58 GMT /slideshow/cloud-jacking-95188913/95188913 BryanMcAninch@slideshare.net(BryanMcAninch) Cloud Jackingâ„¢ BryanMcAninch Subdomain hijacking presents significant security risks to organizations. Everything from credential theft to phishing can be made possible with a few keystrokes and click of a mouse. This talk focuses on how these risks materialize within an AWS cloud environment, how to enumerate their existence, and options to quickly mitigate them. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cloudjacking-180427050858-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Subdomain hijacking presents significant security risks to organizations. Everything from credential theft to phishing can be made possible with a few keystrokes and click of a mouse. This talk focuses on how these risks materialize within an AWS cloud environment, how to enumerate their existence, and options to quickly mitigate them.
Cloud Jackingâ„¢ from Bryan McAninch
]]>
4479 7 https://cdn.slidesharecdn.com/ss_thumbnails/cloudjacking-180427050858-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-BryanMcAninch-48x48.jpg?cb=1712581568 hinac.link https://cdn.slidesharecdn.com/ss_thumbnails/htgfsffap-220926202652-f38be8d9-thumbnail.jpg?width=320&height=320&fit=bounds BryanMcAninch/hacking-the-global-financial-system-for-fun-and-profit-253194139 Hacking the Global Fin... https://cdn.slidesharecdn.com/ss_thumbnails/thefaasandthecurious-180607162418-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/the-faas-and-the-curious-101157367/101157367 The FaaS and the Curiousâ„¢ https://cdn.slidesharecdn.com/ss_thumbnails/cloudjacking-180427050858-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/cloud-jacking-95188913/95188913 Cloud Jackingâ„¢