This chapter walked you through how to set up a vulnerable EC2 environment, simulate a restricted network, and then perform a penetration test on it. We learned how a Jenkins server can be configured in a vulnerable way. Subsequently, we learned how to set up the Nexpose vulnerability scanner and then performed a vulnerability scan on our vulnerable Jenkins server. Further, we learned how to perform automated exploitation of Jenkins using Metasploit and use a meterpreter payload to pivot a host and perform lateral movement inside a restricted network.
This brings us to the end of the fifth chapter. In the next chapter, we will learn about EBS volumes, disk encryption, and volume snapshots. Further, we will learn how to perform for forensic analysis and recover lost data from an EBS volume.