In this chapter, we have learned about what S3 buckets are, how to set up S3 buckets, and how access rights are granted on an S3 bucket. We learned about S3 permissions in detail, as well as how and where each kind of permission is applicable. We walked through how to set up the AWS CLI and access the S3 bucket via the CLI. We also learned about the kind of settings that can make an S3 bucket vulnerable. And finally, we set up our own vulnerable S3 bucket, which we will be using in the next chapter.
In the next chapter, we will learn how to exploit S3 buckets. We will look into the tools that are used to exploit a vulnerable S3 bucket. And, we will learn various post-exploitation techniques that we can apply after exploiting a vulnerable S3 bucket.