(+91) 974-690-6654      |          Email :

Keynote / Chief Guest

Pinarayi Vijayan

Pinarayi Vijayan

Chief Minister

Kerala State


Rajeev Chandrasekhar

Rajeev Chandrasekhar

Union Minister of State for Electronics and Information Technology

Union Minister of State for Skill Development and Entrepreneurship.

Govt. of India

Admiral Radhakrishnan Hari Kumar

Admiral Radhakrishnan Hari Kumar



Ministry of Defence, India

Multi-Cloud Security

  • 21 -22 Sep, 2022
  • 2 days
  • Grand Hyatt, Kochi, India


Manish Gupta CEO & Director , CyberWarFare Labs ,  

Yash Bharadwaj Chief Technical Officer , CyberWarFare Labs ,  

Who should attend

  • Targeted Audience may include the following group of people:
  • → Penetration Testers / Red Teams
  • → Cloud Security Professionals
  • → Cloud Architects
  • → SOC analysts
  • → Threat Hunting Team
  • → Last but not the least, anyone who is interested in strengthening their offensive and detection capabilities in Cloud

  • → Fair Knowledge of Networking and Web Technology
  • → An Open mind
  • *No prior Cloud knowledge is required


Enterprises across the globe are moving to the Cloud Technology. The technical understanding and enormous cost of rewriting infrastructure applied applications to re-platform and work with the new cloud concept is a difficult task. The irregularities caused due to mis-understanding / deficit knowledge of New Cloud Concepts offered by leading Cloud Service Providers like AWS, Microsoft Azure and GCP etc have introduced multiple loopholes easily identified and exploited by Threat Actors to abuse and exploit the organization infrastructure.

CyberWarFare Labs workshop on "Multi-Cloud Security" aims to provide the trainees with the insights of the offensive / defensive techniques used by the Red Teamers and Blue Teamers in an Enterprise Cloud Infrastructure.

As an Attacker, trainee will not only understand the advanced Real-World Cyber Attacks against various major Cloud Vendors like AWS, Microsoft Azure, GCP but also simulate Tactics, Techniques and Procedures (TTP's) widely used by APT groups practically in the lab environment.

As a Defender, trainee will understand various emerging threats and practically approach how to Defend and Secure the Hybrid Multi-Cloud Infrastructure. They will also practically understand widely used Cloud Security Solutions like AWS GuardDuty, Azure Security Centre and GCP Security Command Centre.

  • → Part-1 : Introduction about Multi Cloud Environment
    • Module-1 : Azure Cloud Environment
      • Azure Identity : Azure AD & RBAC
      • O365 / Microsoft 365
      • Long range : GSM
      • Azure Cloud Services (VM, Storage, IaaS, PaaS, SaaS)
    • Module-2 : AWS Cloud Environment
      • Identity & Access Management
      • AWS Cloud Services (IaaS, PaaS, SaaS)
      • AWS SSO
    • Module-3 : GCP Cloud Environment
      • GCP Identity & Access Management
      • GCP Cloud Services (IaaS, PaaS, SaaS)
      • Google Suite / Workspace + Cloud Identity
    • Module-4 : Hybrid Cloud Environment
      • ADFS & External IDP
      • Hybrid Connected Devices
      • On-Prem to Cloud, Cloud to Cloud, Cloud to on-prem
  • → Part-2 : Enumeration & Initial Access on Cloud Infrastructure
    • Module-1 : Unauthenticated Enumeration
      • Enumerating Information from DNS Records
      • Enumerating Information from Cloud Vendors
      • Leaked secrets from github
      • Enumeration storage & other information from OSINT
    • Module-2 : Initial Access
      • Exploiting Cloud Services
      • Leaked Credentials
      • Compromising CI/CD pipeline
      • Compromising storage accounts
    • Module-3 : Authenticated Enumeration
      • AWS Services
      • AAD, O365, Azure Services
      • Cloud Identity, Google Workspace, GCP Services
  • → Part-3 : Exploiting Hybrid Multi-Cloud Services
    • Module-1 : Exploiting Hybrid Multi-Cloud Services
      • AWS : cross account, within account
      • - Azure : service principal, cross tenant, AAD
      • - GCP : Access organization, Cloud Identity
      • - Hybrid - On-Premise AD
    • Module-2 : Privilege Escalation
      • Elevating Privileges on AWS
      • Elevating Privileges on Azure
      • Elevating Privileges on GCP
      • Privilege Escalation from on-prem to cloud
      • Privilege Escalation from cloud to on-prem
    • Module-3 : Defensive Evasion
      • Various Techniques on AWS, Azure & GCP
  • → Part-4 : Lateral Movement
    • Module-1 : Lateral Movement from Cloud to on-premise
      • AWS, GCP, Azure to on-premise
    • Module-2 : Lateral Movement from on-prem to cloud
      • On-prem to AWS, GCP, Azure
    • Module-3 : Within Multi-Cloud
      • AWS, GCP, Azure to each other
  • → Part-5 : Case Study
    • Red Teaming Hybrid Multi Cloud Environment in Simulated Lab (Initial Access to Data Exfiltration)


To make the workshop hands-on in the real sense all the attendees will be provided with Lab Access to the Multi-Cloud Environment. Lab Architecture is designed to cover all the attacks from both aspects that are demonstrated during the workshop sessions. We have a large simulated lab environment that have approx. 24 to 30 unique challenges that will be available to people during and after class.

As mentioned, the lab will be given access for 7 more days with technical support

  • Targeted Audience may include the following group of people:
    • Penetration Testers / Red Teams
    • Cloud Security Professionals
    • Cloud Architects
    • SOC analysts
    • Threat Hunting Team
    • Last but not the least, anyone who is interested in strengthening their offensive and detection capabilities in Cloud
  • Fair Knowledge of Networking and Web Technology
  • An Open mind

* No prior Cloud knowledge is required

  • System with at least 8GB RAM
  • • Updated Web Browser
  • • Team will share updated documentation
  • Soft Copy of the Course Content.
  • Great Knowledge about the Offensive Cloud Techniques used by adversaries.
  • Defence Tactics & Techniques against the discussed offensive techniques.
  • 7 days full lab access with technical support during & after the workshop
  • Custom automated scripts to setup lab scenarios
  • Be a Cloud Security Ninja after the workshop
  • 0-Day / exploit release
  • 2 Days (8 + 8 hours.)
Manish Gupta
Manish Gupta
CEO & Director

CyberWarFare Labs


Manish Gupta is Director of CyberWarFare Labs having 6.5+ years of expertise in Offensive Information Security. Where he specializes in Offensive Security and Red Teaming Activities on enterprise Environment. His Research interest includes Real World Cyber Attack Simulation and Advanced persistent Threat (APT). Previously he has spoken at reputed conferences like Blackhat, DEFCON, Nullcon, BSIDES Chapters, X33fcon, NorthSec etc.

Yash Bharadwaj
Yash Bharadwaj
Chief Technical Officer

CyberWarFare Labs


Yash Bharadwaj, Co-Founder & working as a technical architect & at CyberWarFare Labs. Highly attentive towards finding, learning and discovering new TTP’s used during offensive engagements. His area of interest includes (but not limited to) building Red / Blue team infrastructure, evading AVs & EDRs, Pwning Active Directory infrastructure, stealth enterprise networks & Multi cloud attacks. Previously he has delivered hands-on red / blue / purple team trainings at Nullcon, X33fCon, NorthSec, BSIDES Chapters, OWASP, CISO Platform, YASCON. You can reach out to him on Twitter @flopyas