Infiltrate Security Conference OPEN CFP

This CFP is not yet open - Check back soon!

Cloud Post exploitation techniques

Exploit Research

The cloud is new to many including red teams and the traditionally post exploitation and other common TTP are sometime inapplicable or different due to lack of domain environment and limited surface. The Microsoft Cloud & Enterprise red team will demonstrate some of the post exploitation and persistence vectors they develop and use including but not limited to * Cloud Pivoting * Cloud service remote code execution * Integration of common toolkit but adapted to cloud * Service level and node persistence approaches * Automated recon and data driven toolkit * Indicators of monitoring/detection (IOD/M) * Future exploration

Back to Open CFP
Rated 4 - 23 reviewers



The concepts here are extremely relevant, given the Cloud dominance! Cloud Pivoting and How common toolkits are adapted to cloud, is currently tribal knowledge and needs more sharing :)



Interested in Speaking?

We are pleased to announce the Call For Papers for INFILTRATE 2018 is now open. If you would like to present and have an offense-focused-fresh-content presentation, please submit an abstract, Bio and headshot to This information will be included on our Open CFP site, here, where the public can vote on which presentations they are most interested in seeing at INFILTRATE. Call for papers will close on December 14th, 2017. Shortly after this date, the winning speakers will be notified.

Some of the benefits of speaking at INFILTRATE are: