From the course: Ethical Hacking: Session Hijacking

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Cloud hijacking

Cloud hijacking - Linux Tutorial

From the course: Ethical Hacking: Session Hijacking

Start my 1-month free trial

Cloud hijacking

- [Instructor] Cloud computing has become an important part of the technology landscape and, predictably, is being targeted by cyber criminals. One form of attack is cloud account hijacking where stolen credentials are used to access cloud services. Another is cloud service traffic hijacking, identified by the Cloud Security Alliance as far back as 2013 as one of the top three security risks for cloud computing. Cloud hijacking can be achieved by brute-force guessing of passwords or just unauthorized reuse if an unrelated service for which credentials have been compromised uses the same password as the user's cloud service. Hacking into the service provider also provides an easy route for an attacker to gain access to the passwords if they've been stored with breakable hash or encryption protection or even for an unscrupulous service provide employee to steal them. And of course, if your computer is compromised, then your credentials can be directly stolen. Cloud account hijacking can…

Contents