Pentesting AWS Features through Serverless Applications and Tools
You’ve been a very patient reader so far. Understanding concepts and theory is important before you start learning how to conduct the practical aspect of pentesting. You’ve now reached the first chapter of the book where we’ll not just be theorizing but also putting our knowledge into action.
This chapter features step-by-step guides to using the Amazon Web Services (AWS) first-party security tools to check security configurations and conduct vulnerability assessments to configure the most popular third-party AWS pentesting tools. We will also discuss the pentesting steps to find credentials, enumerate AWS services, conduct vulnerability scans, and discover exposed services with Prowler and Pacu.
This chapter comprises the following main topics:
- How to get an AWS network
- Using AWS PowerShell and the AWS CLI
- Exploring AWS native security tools
- Installing and preparing AWS...