Summary
In this chapter, we discussed how to set up a pivoting lab on AWS where we can practice pivoting techniques. We started by using Terraform to automatically build a simple environment with an attacker instance, along with two target instances. We then tested the network connectivity and security of the lab to validate the network configuration specified in the Terraform code. Lastly, we performed a penetration testing simulation to verify if the lab environment had been set up properly.
Now that we’ve finished this chapter, we will shift our focus to preparing an IAM privilege escalation lab environment in the next chapter. If you are wondering how an IAM privilege escalation lab is (mis)configured, then the next chapter is for you!