Cloud Security Exploitation
Cloud adoption has significantly changed the way organizations collect, process, and store the data of end users. Some businesses automatically assume that their cloud providers will take care of their cybersecurity, but every cloud consumer, be it an individual or a business, must be aware that it’s a shared responsibility. Having said that, the majority of the time, when testers successfully get access to an internal network, they think they are almost done with the test, assuming they can then proceed to compromise the network or enterprise.
In this chapter, we will explore different types of attacks that pentesters can leverage if they gain a foothold into a cloud environment. In particular, we will explore AWS and identify multiple processes for circumventing security controls and demonstrate this using the tools in Kali Linux.
By the end of this chapter, you will have learned how to attack misconfigured cloud services by covering the...