-
Book Overview & Buying
-
Table Of Contents
Cloud Penetration Testing
By :
You’ve been a very patient reader so far. Understanding concepts and theory is important before you start learning how to conduct the practical aspect of pentesting. You’ve now reached the first chapter of the book where we’ll not just be theorizing but also putting our knowledge into action.
This chapter features step-by-step guides to using the Amazon Web Services (AWS) first-party security tools to check security configurations and conduct vulnerability assessments to configure the most popular third-party AWS pentesting tools. We will also discuss the pentesting steps to find credentials, enumerate AWS services, conduct vulnerability scans, and discover exposed services with Prowler and Pacu.
This chapter comprises the following main topics:
Change the font size
Change margin width
Change background colour