Summary
In this chapter, we took a quick tour of different types of cloud services and attacks against those services. We took a deep dive into AWS-specific security misconfigurations, particularly the exploitation of remote web application vulnerabilities through the logs from the load balancer, and took advantage of a misconfigured S3 bucket to gain access to internal EC2 instances. Further, we exploited the privileges of the instance in gaining the database credentials and also explored metadata service header injection attacks. We learned how to create a backdoor user in an AWS environment through an SSRF attack. We then examined some of the useful command-line functions that can be utilized in AWS penetration testing.
In the next chapter, we will focus more on how to bypass Network Access Control (NAC) and antivirus software, User Account Control (UAC), and Windows operating system controls. We will also explore toolsets such as the Veil Framework and Shellter.