Popping reverse shells with Lambda
The final section of this chapter covers one of my favorite parts of pentesting. This section is going to walk us through setting up a vulnerable Lambda function and then using that function to initiate a reverse connection on our pentesting machine. For this section, we will need to use the following:
- Kali Linux on an EC2 instance with a public DNS name
- A Lambda function
Important note
Make sure that you are using an EC2 instance with a public DNS. The Lambda function will need to connect to that public DNS.
The coolness of reverse shells
Getting a "shell" is one of the most rewarding parts of pentesting. Being able to get a reverse shell means that you were able to successfully exploit a target and get persistence on that machine (persistence being a terminal connection on that machine). However, it is more than just a connection; it also highlights issues within the tested environment. For example, a server that calls...