githubEdit

Serverless Security

Overview

Serverless computing (Functions as a Service) introduces unique security challenges. This section covers exploitation techniques for AWS Lambda, Azure Functions, and Google Cloud Functions.

AWS Lambda

Enumeration

# List Lambda functions
aws lambda list-functions --region us-east-1

# Get function details
aws lambda get-function --function-name <function-name>

# Get function configuration (env vars may contain secrets)
aws lambda get-function-configuration --function-name <function-name>

# List event source mappings
aws lambda list-event-source-mappings

# Get function policy
aws lambda get-policy --function-name <function-name>

# List layers (shared code/dependencies)
aws lambda list-layers
aws lambda get-layer-version --layer-name <layer-name> --version-number <version>

Lambda Environment Variables

Lambda IAM Role Abuse

Event Injection

Cold Start Information Disclosure

Lambda Layer Attacks

Azure Functions

Enumeration

Managed Identity Exploitation

Kudu Console Access

HTTP Trigger Vulnerabilities

Google Cloud Functions

Enumeration

Service Account Abuse

Pub/Sub Event Injection

Common Vulnerabilities

Insecure Deserialization

SSRF via Functions

Prototype Pollution (Node.js)

Command Injection

Dependency Vulnerabilities

Persistence Techniques

Lambda Layers for Persistence

Event Source Persistence

Function Code Modification

Detection Evasion

Tools

Resources

Last updated

Was this helpful?