Cloud Console Cartographer: Tapping Into Mapping
This talk introduces Cloud Console Cartographer, an open-source tool designed to map and aggregate noisy cloud console logs into actionable security signals. The tool addresses the challenge of high-volume, low-context API logs in AWS and Azure by applying a two-pass approach to label and group related events. This methodology enables security teams to reconstruct user activity, such as IAM modifications, from fragmented console logs, significantly reducing the time required for threat hunting and incident response.
Stop Drowning in Cloud Console Logs: A New Way to Map Attacker Activity
TLDR: Cloud console logs are notoriously noisy and lack the granular context needed for effective threat hunting. The new Cloud Console Cartographer tool solves this by applying a two-pass labeling and aggregation process to reconstruct user actions from fragmented API calls. This framework allows researchers to turn thousands of low-context events into a handful of high-fidelity "clicks," making it significantly easier to identify malicious behavior in AWS and Azure environments.
Security researchers and incident responders have long struggled with the "needle in a haystack" problem when analyzing cloud logs. When an attacker interacts with the AWS Management Console or Azure Portal, they aren't just running a single command. They are triggering a cascade of API calls that look like background noise to most SIEMs. If you have ever tried to manually correlate a single "Create User" action in AWS CloudTrail with the dozens of surrounding "List" or "Describe" events, you know exactly how painful this is.
The problem is that cloud providers log API calls, not user intent. A single click in the console might generate fifty distinct events, many of which are just the console checking permissions or loading UI widgets. This creates a massive volume of data that obscures the actual attack path.
The Two-Pass Mapping Methodology
The core innovation behind Cloud Console Cartographer is a two-pass approach that moves beyond simple log ingestion. Instead of treating every event as an isolated data point, the tool treats them as components of a larger, intentional action.
In the first pass, the tool assigns labels to individual events based on specific criteria like user-agent strings, request parameters, and event names. This is where you filter out the "background noise" of the console. For example, if you are looking for IAM modifications, you can label events that are strictly related to user creation or policy attachment.
The second pass is where the magic happens. The tool evaluates these labeled events by grouping them around "anchor events." An anchor event is the primary action—the "Create User" call itself. The tool then looks at the surrounding events within a specific time window to see if they match the signal definition for that action. If the criteria are met, it collapses those dozens of fragmented logs into a single, readable "click" summary.
Why This Matters for Pentesters
During a red team engagement or a bug bounty hunt, you are often working against a clock. If you are testing an environment and want to see if your actions are being detected, you need to understand what your footprint looks like. Most testers assume their console activity is invisible because it blends into the noise. This tool proves that it is not invisible; it is just poorly indexed.
By using this tool, you can see exactly how your console interactions appear to a blue team. If you are performing T1098 (Account Manipulation) or T1087 (Account Discovery), you can now visualize the exact sequence of events that your activity generates. This is invaluable for refining your tradecraft and understanding the detection surface of the cloud services you are targeting.
Technical Implementation and Data Normalization
The tool uses a JSON-based signal definition that is highly extensible. You can define your own signals based on the specific environment you are testing. The structure allows you to define the anchor event, the required events, and the optional events.
{
"LabelType": "IAM_Users",
"Name": "Clicked IAM-Users",
"AnchorEvent": "iam:ListUsers",
"RequiredEvents": ["iam:GetLoginProfile", "iam:ListSigningCertificates"],
"OptionalEvents": ["iam:GetAccessKeyLastUsed"]
}
This structure is powerful because it handles the variability of cloud logs. Different services and different console versions produce slightly different event sequences. By defining these relationships, you create a baseline that is resilient to minor changes in how the cloud provider logs activity.
Defensive Implications
For those of you who work with blue teams, this tool is a massive force multiplier for OWASP A09:2021 – Security Logging and Monitoring Failures. Most organizations have the logs, but they lack the context to make them useful. By implementing this kind of aggregation, you can reduce the number of alerts your team has to triage by orders of magnitude. Instead of investigating 700 individual events, your analysts can look at a single, mapped "click" that tells them exactly what the user did, what permissions they had, and what resources they touched.
Moving Forward
Stop relying on raw log dumps to find sophisticated attackers. The volume of data in modern cloud environments makes manual analysis impossible. We need to shift our focus toward mapping intent rather than just searching for keywords. If you are doing any kind of cloud security work, pull down the code, feed it some of your own logs, and see what your console activity actually looks like. You might be surprised at how much of your "stealthy" activity is actually screaming for attention in the logs.
Vulnerability Classes
Tools Used
Target Technologies
Attack Techniques
Up Next From This Conference

How to Read and Write a High-Level Bytecode Decompiler

Opening Keynote: Black Hat Asia 2024

AI Governance and Security: A Conversation with Singapore's Chief AI Officer
Similar Talks

Firewalls Under Fire: China's Ongoing Campaign to Compromise Network Protection Devices

Rayhunter: Detecting IMSI Catchers

