Chapter 9: Real-Life Pentesting with Metasploit and More!
Up until now, we have looked at how various services are set up and how we can modify and exploit them – as well as having discussed simple solutions for how we can recommend fixing them. Now we are going to be moving forward quite significantly and will apply our knowledge of pentesting. We will use AWS and tools such as Metasploit to help us leverage exploiting vulnerabilities within AWS environments. This chapter will take on a real-life approach to how you would pentest AWS environments in a real-world setting.
We will do some basic setups of new systems to mimic common vulnerabilities, as well as looking at some of the images we set up in previous chapters. We will run through real-life pentesting scenarios that you could expect to come across, as well as some fun exercises that will teach you some new tactics and techniques. We will be finishing the chapter by exploring some AWS modules within Metasploit that...