Test lab
AWS tools
Preparation
Reconnaissance
Enumeration
Notes on techniques
Introduction
What?
Why?
How?
Challenges and problems
Lack of transparency
Resource sharing
Policy restrictions
AWS
Azure
GCP
Resources
Account and privilege attacks
Credential harvesting
Federated authentication
Account takeover
Attack
Password spraying
Remediation
Resources
Cloud-centric attacks
Denial of service
Volumetric attacks
Direct-to-origin attacks
Malware injection
Server-side template injection
Side-channel attacks
Abusing software development kits
Remediation
Resources
Abusing misconfigurations
Identity and access management
Federation attacks
Federation
Local network to cloud attack
Escalation
Object storage attacks
Container attacks
Containerisation
Attack
Remediation
Resources
Hacking CI/CD pipelines
Poison open source supply chain
Create a new package
Infect an existing package
Remediation
Resources
IAM
Introduction
What?
Why?
How?
IAM enumeration
Console Based Enumeration
CLI Based Enumeration
Resources
Misconfigured trust policy
Overly permissive permission I
Dangerous policy combination I
Dangerous policy combination II
Overly permissive permission II
Pass Role: EC2
Pass Role: Lambda
Pass Role: CloudFormation
API Gateway
Introduction
What?
Why?
How?
API gateway enumeration
Verb tampering
Misconfigured private API
IAM based authentication
Denial of service
Poor Lambda authoriser
More
Bust-a-Kube
flAWS 2
AWSGoat
CloudGoat
Head in the clouds
Ty Myrddin Home
Unseen University
Improbability Blog
About
Contact
Index