Summary
In this chapter, we learned a little bit about attack techniques by analyzing and discussing the MITRE ATT&CK framework, and then we finished the chapter with a fun and interactive exercise on utilizing AWS for an AWS phishing campaign.
This chapter wraps up the book. I hope you have enjoyed reading it just as much as I have writing it!