BSides Canberra 2025

Abusing native cloud services for Command and Control
2025-09-27 , Main Track

Whether you’re a startup looking to rapidly deploy innovative solutions, an enterprise aiming to optimize operations, or a developer yearning to focus on creative problem-solving, providers like AWS, GCP and Azure have a cloud native service that can work for you. And in addition to helping these boring groups, cloud providers also offer amazing ways for attackers to hide their command and control traffic!

This talk will discuss cloud native services from the three major providers that can be abused to receive callbacks from compromised hosts into your C&C server in the cloud.

Stephen has been working in cyber security for around 20 years across both Government and the private sector. His current focus includes work such as security research, pentesting, vulnerability hunting, purple and red teaming, working on cyber security incidents and building, designing and maintaining offensive security systems and tools.