In this chapter, we learned what RDS instances are and how to create an RDS instance. We then set up a WordPress website on an EC2 machine and then configured it to use the RDS instance as the database server. We saw how an RDS instance can be made vulnerable. Furthermore, we used Nmap and Hydra to identify and exploit vulnerable RDS instances. Finally, we learned how we can tamper the data of an RDS instance to create a new WordPress user.
In the next chapter, we will learn how to pentest various other AWS APIs.