In continuation from the previous chapter, we learned how we can exploit a vulnerable S3 bucket. We had a walk-through of AWSBucketDump and how it can be used to dump data from vulnerable S3 buckets. Further more, we learned how we can exploit unclaimed S3 buckets, as well as how we can backdoor and inject malicious code in a vulnerable and/or unclaimed S3 bucket.
In the next chapter, we will learn how to pentest AWS Lambda. We will look at exploiting vulnerable Lambda instances and learn pots exploitation methods, like pivoting from a compromised AWS Lambda.