Summary
In this chapter, we took a deeper look at how we can use Metasploit to perform a couple of lifelike pentesting scenarios that helped give us a better understanding of how real pentesting occurs with AWS. We also looked at some of the modules used in AWS that allow us to execute functional testing within our scoped environment and gather information that allows us to further our attacks.
Next, we will begin to look at what happens after we complete a pentest. It is important to understand the concepts and processes and what to do once a pentest is completed and how we can use that post-pentest time to help secure clients. We will also start discussing further how we prep for a pentest and the steps needed to complete a successful pentest in AWS.