Simulating penetration testing in the lab environment
In the previous section, we used ChatGPT (a generative AI solution) to help us generate exploit code. If you are wondering where we will use the generated code, we will use it in our penetration testing simulation in this section.
In our simulation, we will start with a set of credentials for a workshop user account with a limited set of permissions. The workshop user account should allow the lab user to access a SageMaker notebook instance along with files stored inside the instance. In addition to this, the lab user should be able to run the code inside the .ipynb
files stored inside the notebook instance (with the help of the permissions from the IAM role attached to the notebook instance).
Let’s look at an overview of what we’ll do in this section:
Figure 7.35 – High-level diagram of what we’ll do in this section
Since the role attached to the SageMaker notebook...