This section covers the attacks for services under the Cloud Compute umbrella of AWS.
This includes attacks against AWS EC2 instances.
This module will primarily cover
Attacking EC2 via exposed ports
Abuse Application Server misconfigurations
Abuse the EC2 metadata endpoint
Steal credentials from the EC2 instance
Attack Serverless lambda endpoints
Use AWS inspector to perform a security audit
No additional information for this section
Last updated 5 years ago