Book Content
chapters • 16h56m total length
1. Setting Up a Pentesting Lab on AWS
2. Setting Up a Kali PentestBox on the Cloud
3. Exploitation on the Cloud using Kali Linux
4. Setting Up Your First EC2 Instances
5. Penetration Testing of EC2 Instances using Kali Linux
6. Elastic Block Stores and Snapshots - Retrieving Deleted Data
7. Reconnaissance - Identifying Vulnerable S3 Buckets
8. Exploiting Permissive S3 Buckets for Fun and Profit
9. Identity Access Management on AWS
10. Privilege Escalation of AWS Accounts Using Stolen Keys, Boto3, and Pacu
11. Using Boto3 and Pacu to Maintain AWS Persistence
12. Security and Pentesting of AWS Lambda
13. Pentesting and Securing AWS RDS
14. Targeting Other Services
15. Pentesting CloudTrail
16. GuardDuty
17. Using Scout Suite for AWS Security Auditing
18. Using Pacu for AWS Pentesting
19. Putting it All Together - Real - World AWS Pentesting














