All Projects → PacktPublishing → Hands-On-AWS-Penetration-Testing-with-Kali-Linux

PacktPublishing / Hands-On-AWS-Penetration-Testing-with-Kali-Linux

Licence: MIT License
Hands-On AWS Penetration Testing with Kali Linux published by Packt

Programming Languages

python
139335 projects - #7 most used programming language
HTML
75241 projects

Hands-On AWS Penetration Testing with Kali Linux

Hands-On AWS Penetration Testing with Kali Linux

This is the code repository for Hands-On AWS Penetration Testing with Kali Linux, published by Packt.

Set up a virtual lab and pentest major AWS services, including EC2, S3, Lambda, and CloudFormation

What is this book about?

The cloud is taking over the IT industry. Any organization housing a large amount of data or a large infrastructure has started moving cloud-ward and AWS rules the roost when it comes to cloud service providers, with its closest competitor having less than half of its market share. This highlights the importance of security on the cloud, especially on AWS. While a lot has been said (and written) about how cloud environments can be secured, performing external security assessments in the form of pentests on AWS is still seen as a dark art.

This book covers the following exciting features: Familiarize yourself with and pentest the most common external-facing AWS services Audit your own infrastructure and identify flaws, weaknesses, and loopholes Demonstrate the process of lateral and vertical movement through a partially compromised AWS account Maintain stealth and persistence within a compromised AWS account Master a hands-on approach to pentesting Discover a number of automated tools to ease the process of continuously assessing and improving the security stance of an AWS infrastructure

If you feel this book is for you, get your copy today!

https://www.packtpub.com/

Instructions and Navigations

All of the code is organized into folders. For example, Chapter02.

The code will look like the following:

"Environment": {
"Variables": {
"app_secret": "1234567890"
}
}

Following is what you need for this book: If you are a security analyst or a penetration tester and are interested in exploiting Cloud environments to reveal vulnerable areas and secure them, then this book is for you. A basic understanding of penetration testing, cloud computing, and its security concepts is mandatory.

With the following software and hardware list you can run all code files present in the book (Chapter 1-19).

Software and Hardware List

Chapter Software required
1-19 Amazon EC2
Amazon S3
Amazon Route53
Amazon SES
Amazon RDS
AWS IAM
AWS Lambda
AWS CloudFormation
AWS CloudTrail
AWS GuardDuty, AWS CloudGoat

We also provide a PDF file that has color images of the screenshots/diagrams used in this book. Click here to download it.

Related products

  • Kali Linux 2018: Windows Penetration Testing - Second Edition [Packt] [Amazon]

  • AWS Certified SysOps Administrator - Associate Guide [Packt] [Amazon]

Get to Know the Author

Karl Gilbert is a security researcher who has contributed to the security of some widely used open-source software. His primary interests relate to vulnerability research, 0-days, cloud security, secure DevOps, and CI/CD.

Benjamin Caudill is a security researcher and founder of pentesting firm Rhino Security Labs. Built on 10+ years of offensive security experience, Benjamin directed the company with research and development as its foundation, into a key resource for high-needs clients. Benjamin has also been a major contributor to AWS security research. With co-researcher Spencer Gietzen, the two have developed Pacu (the AWS exploitation framework) and identified dozens of new attack vectors in cloud architecture. Both GCP and Azure research are expected throughout 2019. As a regular contributor to the security industry, Benjamin been featured on CNN, Wired, Washington Post, and other major media outlets.

Suggestions and Feedback

Click here if you have any feedback or suggestions.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].