Section 2: Pentesting the Cloud – Exploiting AWS
Section 2 sets out to go over how to perform pentests in a controlled AWS environment. You will learn how to perform pentesting on various AWS resources and also learn how to use public pentesting tools to exploit common vulnerabilities and misconfigurations found in AWS.
This section contains the following chapters:
- Chapter 3, Exploring Pentesting and AWS
- Chapter 4, Exploiting S3 Buckets
- Chapter 5, Understanding Vulnerable RDS Services
- Chapter 6, Setting Up and Pentesting AWS Aurora RDS
- Chapter 7, Assessing and Pentesting Lambda Services
- Chapter 8, Assessing AWS API Gateway
- Chapter 9, Real-Life Pentesting with Metasploit and More!