Book Image

Introduction to AWS Pentesting [Video]

By : ACI Learning, Daniel Lowrie, Sophie Goodwin
Book Image

Introduction to AWS Pentesting [Video]

By: ACI Learning, Daniel Lowrie, Sophie Goodwin

Overview of this book

The "Introduction to AWS Pentesting" course offers a detailed exploration into the specialized field of penetration testing within Amazon Web Services (AWS), providing a strategic blend of policy understanding, technical insights, and hands-on techniques. Beginning with a crucial overview of AWS Pentesting Policy, the course outlines the legal landscape, guiding participants on what is permissible in the realm of AWS security testing. This foundational knowledge is vital for conducting responsible and effective penetration testing activities. As participants progress through the series, they delve deeper into the mechanics of AWS, with specific episodes dedicated to understanding and exploiting vulnerabilities in key services such as IAM, S3, EC2, and Lambda. In addition to technical skills, the course fosters a comprehensive understanding of AWS resource naming with ARNs, enhancing the ability to navigate and manipulate AWS architecture for security testing purposes. By the end of the series, participants will not only be prepared to spot and mitigate security risks but also to leverage AWS features and tools to strengthen infrastructure against future threats.
Table of Contents (4 chapters)
Chapter 3
Flaws
Content Locked
Section 5
Flaws: Level 5
In this episode, we attempt the Flaws Level 5 challenge which focuses on exploiting the EC2 Instance Meta-Data Service and gaining access to a hidden S3 bucket.