From the course: Ethical Hacking: Session Hijacking

Unlock this course with a free trial

Join today to access over 25,300 courses taught by industry experts.

Cloud hijacking

Cloud hijacking

- [Instructor] Cloud computing has become an important part of the technology landscape and, predictably, is being targeted by cyber criminals. One form of attack is cloud account hijacking where stolen credentials are used to access cloud services. Another is cloud service traffic hijacking, identified by the Cloud Security Alliance as far back as 2013 as one of the top three security risks for cloud computing. Cloud hijacking can be achieved by brute-force guessing of passwords or just unauthorized reuse if an unrelated service for which credentials have been compromised uses the same password as the user's cloud service. Hacking into the service provider also provides an easy route for an attacker to gain access to the passwords if they've been stored with breakable hash or encryption protection or even for an unscrupulous service provide employee to steal them. And of course, if your computer is compromised, then your credentials can be directly stolen. Cloud account hijacking can…

Contents