Cloud compute

This section covers the attacks for services under the Cloud Compute umbrella of AWS.

This includes attacks against AWS EC2 instances.

What are we going to cover

This module will primarily cover

  • Attacking EC2 via exposed ports

  • Abuse Application Server misconfigurations

  • Abuse the EC2 metadata endpoint

  • Steal credentials from the EC2 instance

  • Attack Serverless lambda endpoints

  • Use AWS inspector to perform a security audit

Additional Information

No additional information for this section

Last updated