The AWS and Azure network access for this training
Last updated
Last updated
Here's a diagram that shows how the entire network is laid out. Basically so far and when we run our setup commands during these 3 days,
Each one of you has your own virtual machine
Each one of you has your own attacker machine running inside your AWS
Each one of you have your own targets running in AWS and Azure that are not accessible to the Internet but are accessible only to your attacker machines
The S3 buckets that you will setup will be exposed to the Internet, but we will be using special names that cannot be guessed outside this training (more on this when we tackle the S3 scenario)
We will mention access to various targets if access is different than what is mentioned above