Cloud compute
This section covers the attacks for services under the Cloud Compute umbrella of AWS.
This includes attacks against AWS EC2 instances.
What are we going to cover
This module will primarily cover
Attacking EC2 via exposed ports
Abuse Application Server misconfigurations
Abuse the EC2 metadata endpoint
Steal credentials from the EC2 instance
Attack Serverless lambda endpoints
Use AWS inspector to perform a security audit
Additional Information
No additional information for this section
Last updated