Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Corey Quinn. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Corey Quinn or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Replay - Hacking AWS in Good Faith with Nick Frichette

32:32
 
Share
 

Manage episode 457590976 series 2937944
Content provided by Corey Quinn. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Corey Quinn or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

On this Screaming in the Cloud Replay, we’re taking you back to our chat with Nick Frichette. He’s the maintainer of hackingthe.cloud, and holds security and solutions architect AWS certifications, and in his spare time, he conducts vulnerability research at Hacking the Cloud. Join Corey and Nick as they talk about the various kinds of cloud security researchers and touch upon offensive security, why Nick decided to create Hacking the Cloud, how AWS lets security researchers conduct penetration testing in good faith, some of the more interesting AWS exploits Nick has discovered, how it’s fun to play keep-away with incident response, why you need to get legal approval before conducting penetration testing, and more.

Show Highlights

(0:00) Intro

(0:42) The Duckbill Group sponsor read

(1:15) What is a Cloud Security Researcher?

(3:49) Nick’s work with Hacking the Cloud

(5:24) Building relationships with cloud providers

(7:34) Nick’s security findings through cloud logs

(13:05) How Nick finds security flaws

(15:31) Reporting vulnerabilities to AWS and “bug bounty” programs

(18:41) The Duckbill Group sponsor read

(19:24) How to report vulnerabilities ethically

(21:52) Good disclosure programs vs. bad ones

(28:23) What’s next for Nick

(31:27) Where you can find more from Nick

About Nick Frichette

Nick Frichette is a Staff Security Researcher at Datadog, specializing in offensive security within AWS environments. His focus is on discovering new attack vectors targeting AWS services, environments, and applications. From his research, Nick develops detection methods and preventive measures to secure these systems. Nick’s work often leads to the discovery of vulnerabilities within AWS itself, and he collaborates closely with Amazon to ensure they are remediated.

Nick has also presented his research at major industry conferences, including Black Hat USA, DEF CON, fwd:cloudsec, and others.

Links

Original Episode

https://www.lastweekinaws.com/podcast/screaming-in-the-cloud/hacking-aws-in-good-faith-with-nick-frichette/

Sponsor

The Duckbill Group: duckbillgroup.com

  continue reading

648 episodes

Artwork
iconShare
 
Manage episode 457590976 series 2937944
Content provided by Corey Quinn. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Corey Quinn or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

On this Screaming in the Cloud Replay, we’re taking you back to our chat with Nick Frichette. He’s the maintainer of hackingthe.cloud, and holds security and solutions architect AWS certifications, and in his spare time, he conducts vulnerability research at Hacking the Cloud. Join Corey and Nick as they talk about the various kinds of cloud security researchers and touch upon offensive security, why Nick decided to create Hacking the Cloud, how AWS lets security researchers conduct penetration testing in good faith, some of the more interesting AWS exploits Nick has discovered, how it’s fun to play keep-away with incident response, why you need to get legal approval before conducting penetration testing, and more.

Show Highlights

(0:00) Intro

(0:42) The Duckbill Group sponsor read

(1:15) What is a Cloud Security Researcher?

(3:49) Nick’s work with Hacking the Cloud

(5:24) Building relationships with cloud providers

(7:34) Nick’s security findings through cloud logs

(13:05) How Nick finds security flaws

(15:31) Reporting vulnerabilities to AWS and “bug bounty” programs

(18:41) The Duckbill Group sponsor read

(19:24) How to report vulnerabilities ethically

(21:52) Good disclosure programs vs. bad ones

(28:23) What’s next for Nick

(31:27) Where you can find more from Nick

About Nick Frichette

Nick Frichette is a Staff Security Researcher at Datadog, specializing in offensive security within AWS environments. His focus is on discovering new attack vectors targeting AWS services, environments, and applications. From his research, Nick develops detection methods and preventive measures to secure these systems. Nick’s work often leads to the discovery of vulnerabilities within AWS itself, and he collaborates closely with Amazon to ensure they are remediated.

Nick has also presented his research at major industry conferences, including Black Hat USA, DEF CON, fwd:cloudsec, and others.

Links

Original Episode

https://www.lastweekinaws.com/podcast/screaming-in-the-cloud/hacking-aws-in-good-faith-with-nick-frichette/

Sponsor

The Duckbill Group: duckbillgroup.com

  continue reading

648 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play