Exploiting AWS applications
Now that we’ve installed a number of pentesting applications and run some simple scripts, let’s get deeper into AWS exploitation with Prowler and Pacu.
Prowler
First, let’s conduct some pentesting and vulnerability scanning activities in Prowler.
Have your AWS credentials ready. You can verify them by logging in to your AWS account from your web browser. On the top menu bar, look at the far right drop-down menu with your username. Click on Security credentials to navigate to the correct AWS Identity and Access Management (IAM) page. At the top, it should say My security credentials (root user). Make a note of your AWS account ID, access key ID, and secret access key. Then, follow these steps:
- Now, let’s open AWS CloudShell again. Enter this command to configure your key:
aws configure
- In the
AWS_ACCESS_KEY_ID=
field, paste the key ID you generated and hit Enter. Hit Enter for all the other fields too; we’...