Chapter 12: Other Projects with AWS
To conclude this book, I wanted to make a brief mention of two other different projects that are good to note and dig into. Throughout this book, we have taken quite a bit of a high-level view as well as a bunch of low-level views (hands-on portions) to create a cohesive understanding of pentesting and what it means to AWS. This final chapter is going to discuss an open source framework that is used by red teamers, penetration testers, and ethical hackers that allows businesses to test real adversary tactics and methods on their organizations – to ultimately better the controls and defenses by locating areas of weakness. We will then end with a fun exercise that came from a phishing project I came up with back in 2019, where we will learn how to leverage EC2 to set up quick and impactful phishing exercises that you can use on an authorized organization.
In this chapter, we'll cover the following topics:
- Understanding the MITRE...