Summary
In this chapter, we looked at how to create Lambda functions and their functionality in AWS. We also looked at vulnerable issues with Lambda and the vulnerabilities that those issues can present to an organization that fails to isolate those issues. Creating reverse shells helps us understand the seriousness of what can go wrong if a vulnerable Lambda function becomes present in an environment.
In the next chapter, we are going to start looking at how we attack AWS APIs and see how they handle requests, as well as discussing the techniques used to secure them.