The post-exploitation (or service exploitation) phase is essentially where we target as many AWS services as possible to try and uncover weaknesses, misconfigurations, and bad practices. We'll cover some of the primary AWS services in this section, but any AWS service is a potential for exploitation and misconfigurations, so it is almost always fruitful to look at any service or resources that are being used, even if you may be unfamiliar with the service itself.
Post-exploitation
EC2 exploitation
We have already begun working on some EC2-related stuff, so that's where we are going to start. EC2 is also one of the most common services you will encounter during your pentests, so it is a good idea to become intimately...