Module 19 : Cloud Computing
Ethical hackers or pen testers use numerous tools and techniques to hack the target cloud platform. Recommended labs that will assist you in learning various cloud platform hacking techniques include:
Perform Reconnaissance on Azure
Azure reconnaissance with AADInternals
Exploit S3 buckets
Exploit open S3 buckets using AWS CLI
Perform privilege escalation to gain higher privileges
Escalate IAM user privileges by exploiting misconfigured user policy
Perform vulnerability assessment on Docker images
Vulnerability assessment on Docker images using Trivy
Lab 1: Perform Reconnaissance on Azure
Task 1: Azure Reconnaissance with AADInternals
Lab 2: Exploit S3 Buckets
Task 1: Exploit Open S3 Buckets using AWS CLI
Lab 3: Perform Privilege Escalation to Gain Higher Privileges
Task 1: Escalate IAM User Privileges by Exploiting Misconfigured User Policy
Creating UserPolicy
Creating Policies on AWS
Attaching policies to the user:
List Attached users:
Other Available commands:
Lab 4: Perform Vulnerability Assessment on Docker Images
Task 1: Vulnerability Assessment on Docker Images using Trivy
Last updated