All Projects → appsecco → Attacking Cloudgoat2

appsecco / Attacking Cloudgoat2

Licence: other
A step-by-step walkthrough of CloudGoat 2.0 scenarios.

Projects that are alternatives of or similar to Attacking Cloudgoat2

Awspx
A graph-based tool for visualizing effective access and resource relationships in AWS environments.
Stars: ✭ 546 (+462.89%)
Mutual labels:  aws, pentesting
Slurp
Evaluate the security of S3 buckets
Stars: ✭ 183 (+88.66%)
Mutual labels:  aws, pentesting
Python Aws S3
Demo of AWS S3 Walkthrough using Python
Stars: ✭ 169 (+74.23%)
Mutual labels:  aws, walkthrough
Aaia
AWS Identity and Access Management Visualizer and Anomaly Finder
Stars: ✭ 218 (+124.74%)
Mutual labels:  aws, pentesting
Ccat
Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.
Stars: ✭ 300 (+209.28%)
Mutual labels:  aws, pentesting
Serverless Aws Documentation
Serverless 1.0 plugin to add documentation and models to the serverless generated API Gateway
Stars: ✭ 299 (+208.25%)
Mutual labels:  aws, documentation
Cgx
💻🔥CLI to generate the recommended documentation/files to improve contribution (Github, Gitlab, CodeCommit and Bitbucket)
Stars: ✭ 190 (+95.88%)
Mutual labels:  aws, documentation
Aws Doc Sdk Examples
Welcome to the AWS Code Examples Repository. This repo contains code examples used in the AWS documentation, AWS SDK Developer Guides, and more. For more information, see the Readme.rst file below.
Stars: ✭ 4,575 (+4616.49%)
Mutual labels:  aws, documentation
Module Security Public
The public documentation for the gruntwork-io/module-security repo, which contains packages for setting up best practices for managing secrets, credentials, and servers
Stars: ✭ 67 (-30.93%)
Mutual labels:  aws, documentation
S3scanner
Scan for open AWS S3 buckets and dump the contents
Stars: ✭ 1,319 (+1259.79%)
Mutual labels:  aws
Resource files
mosquito - Automating reconnaissance and brute force attacks
Stars: ✭ 95 (-2.06%)
Mutual labels:  pentesting
Yookassa Github Docs
Stars: ✭ 93 (-4.12%)
Mutual labels:  documentation
Aws Cli Cheatsheet
☁️ AWS CLI + JQ = Make life easier
Stars: ✭ 94 (-3.09%)
Mutual labels:  aws
Docs
Cycle ORM Documentation
Stars: ✭ 95 (-2.06%)
Mutual labels:  documentation
Senza
Deploy immutable application stacks and create and execute AWS CloudFormation templates in a sane way
Stars: ✭ 93 (-4.12%)
Mutual labels:  aws
Put2win
Script to automate PUT HTTP method exploitation to get shell
Stars: ✭ 96 (-1.03%)
Mutual labels:  pentesting
Ecs Nginx Proxy
Reverse proxy for AWS ECS. Lets you address your docker containers by sub domain.
Stars: ✭ 93 (-4.12%)
Mutual labels:  aws
Mkdocs macros plugin
Create richer and more beautiful pages in MkDocs, by using variables and calls to macros in the markdown code.
Stars: ✭ 93 (-4.12%)
Mutual labels:  documentation
Cloudsploit
Cloud Security Posture Management (CSPM)
Stars: ✭ 1,338 (+1279.38%)
Mutual labels:  aws
Deepsea
DeepSea Phishing Gear
Stars: ✭ 96 (-1.03%)
Mutual labels:  pentesting

Attacking CloudGoat 2

attacking-cloudgoat-banner

What is this book about?

This book aims to be a step-by-step walkthrough of CloudGoat 2.0 scenarios.

CloudGoat 2.0 is a "vulnerable by design" AWS deployment tool. CloudGoat allows users to create intentionally vulnerable AWS environments.

Who this book is for?

The intended audience for this book are -

  1. Penetration testers, who are interested in learning to attack AWS services
  2. Developers/System Administrators/Cloud Engineers who are interested in understanding the attack surface around AWS services

Setting up the book

The book is written in markdown format, you can use mdBook to host a local copy.

Steps to do this

  1. Install Rust by following the instructions at https://www.rust-lang.org/tools/install
  2. Install mdBook (cargo install mdbook) or download binaries from https://github.com/rust-lang/mdBook/releases
  3. cd into the documentation folder
  4. mdbook serve
  5. Browse to http://localhost:3000

Quick reference

License

Reader feedback

Feedback from readers is expected and appreciated. We are actively looking forward to improving the book. Let us know what you think about this book — what you liked or may have disliked. Reader feedback is important for us to develop more books.

If you find mistakes, omissions, errors or blatant lies in this document, please send me a refreshed version of the affected paragraph and I will make amended versions. I will give proper credits to everyone who helps out! I hope to make this document better over time.

You can provide the feedback by raising an issue in this repo.

About Appsecco

At Appsecco we provide advice, testing and training around software, infra, web and mobile apps, especially that are cloud hosted. We also specialise in auditing AWS environments as per the AWS CIS Foundations Benchmark to create a picture of the current state of security in your AWS environment. Our experience has led us to creating multiple hands on training courses like the very popular “Breaking and Pwning Apps and Servers on AWS and Azure” and “Automated Defence using Cloud Services for AWS, Azure and GCP”.

Acknowledgments

  • Ninja image design vector created by freepik
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].