Skip to content

RosanaFSS/AWS-Attacking-and-Defending

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

17 Commits
 
 
 
 

Repository files navigation

Attacking and Defending AWS


1 . Introduction to AWS

Learn about the unique characteristics associated with cloud technologies and core fundamentals required to use AWS.

✅   🔗   AWS: Cloud 101
✅   🔗   AWS Basic Concepts

2 . Introduction to IAM

Understand the parts of the identity and access management service to set a good foundation for attacking and defending this service.

✅   🔗   Introduction to AWS IAM
✅   🔗   IAM Principals
✅   🚩   IAM Permissions
✅   🚩   IAM Credentials
✅   🔗   The Quest of Least Privilege
✅   🔗   STS Credentials Lab


3 . Attacking and Defending Core Services

Explore security misconfiguration on commonly used AWS services, including EC2, S3, VPC and more.

✅   🔗   AWS S3 - Attack and Defense
✅   🔗   Amazon EC2 - Attack & Defense
✅   🚩   AWS VPC - Attack and Defense
✅   🚩   AWS VPC - Data Exfiltration


4 . Attacking and Defending Serverless

Serverless technologies are popular when designing infrastructure. Work with various AWS components to understand how they can be exploited.

✅   🔗   AWS Lambda
✅   🔗   Lambda - Data Exfiltration
✅   🔗   AWS API Gateway


5 . IAM Privilege Escalation

Put your understanding of IAM to practice by covering key concepts required to enumerate, exploit and persist across IAM.

✅   🔗   AWS IAM Enumeration
✅   🔗   AWS IAM Initial Access


Attacking and Defending AWS

About

AWS

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors