Head in the Cloud, Feet on the Ground: A Practical Look at Cloud Attacks