AWS Penetration Testing – Series Overview

In this series, we’ll explore Amazon’s approach towards users testing the security of their AWS services. We’ll explore popular ways to enumerate and take advantage of various AWS services to compromise the target infrastructure further.

Throughout this series some examples will be provided, any identifiable account information has been substituted for sample information.

Here’s a complete overview of the arctil AWS Penetration Testing series;

  1. AWS Penetration Testing Policy and Scoping
    • Introduction
    • Prohibited Testing Methods
    • Scoping
  2. AWS Command Line Interface
    • Introduction
    • Configuring and Usage
  3. S3 Buckets
    • Introduction to S3 Buckets
    • Enumerating Public S3 Buckets
    • How S3 Manages Public Bucket Access
    • Further Bucket Enumeration
    • Using AWSBucketDump To Enumerate S3 Buckets
    • Uploading To Public S3 Buckets
    • Conclusion
  4. EC2
    • Introduction To EC2
    • Getting Started With Penetration Testing On An EC2 Instance
    • Exploiting The Metadata Service
    • Further Web Application Exploitation
    • Exploring Snapshots
    • Understanding Security Groups
  5. Identity and Access Management
    • Using IAM For Enumeration
    • Understanding AWS Policies
    • Bruteforcing API Calls Using enumerate-iam and awsenum
    • Maintaining Access
  6. DynamoDB and RDS
    • Introduction To DynamoDB
    • Introduction To RDS
    • Creating And Assigning Security Groups
  7. Lambda
    • Introduction To Lambda
    • Lambda Enumeration
  8. Secrets Manager
    • Introduction To Secrets Manager
    • Exploring Secrets
  9. CloudTrail
    • Introduction To CloudTrail
  10. Pacu Exploitation Framework
    • Introduction To Pacu
    • Getting Started With Pacu
    • Service Enumeration Using Pacu Modules
    • Privilege Escalation With Pacu
    • Lateral Movement And Persistence With Pacu
    • Conclusion
  11. Final Assessment and Additional Resources

Up Next “AWS Penetration Testing Policy and Scoping”

Spread the love