Summary
In this chapter, we learned a bit about web traffic and web requests as they pertain to APIs and gateways in AWS. We learned how to deploy a simple API gateway, and also learned how to use a vital tool for assessing APIs and gateways – Burp Suite. We ran through a fun exercise that illustrated using Burp Suite to manipulate HTTP requests and mentioned the dangers of leaving APIs vulnerable. With this knowledge, you can now perform attacks and assessments on web-based applications and services using the methods learned in this chapter.
We are going to further our knowledge of AWS by applying more hands-on experience in the next chapter. It is the longest chapter in the book and will have you setting up new environments and exploiting them based on scenarios – ultimately, teaching you the technical portion of AWS pentesting and the processes that come with it.