In this chapter, we will be looking at a real-world AWS pentest from start to finish. This should help tie together many of the chapters in this book and demonstrate the flow of penetration testing an AWS environment. We will skip over many of the technical details of how certain attacks work, because they have already been outlined in their respective chapter in this book.
When pentesting an AWS environment, it is important to be thorough and to investigate every attack possible with the access that you are granted. This ensures that the results you provide the client at the end of the engagement are thorough, complete, and useful, and assure them that they can feel confident that their infrastructure was investigated on a wide scale.
Throughout this chapter, we will be referencing two IAM users at different points. One IAM...