Profile PictureVery Lazy Tech
$5

E - Book - Hands-On AWS Penetration Testing with Kali Linux: Set up a virtual lab and pentest major AWS services, including EC2, S3, Lambda

Add to cart

E - Book - Hands-On AWS Penetration Testing with Kali Linux: Set up a virtual lab and pentest major AWS services, including EC2, S3, Lambda

$5

📚 Penetration Testing AWS with Kali Linux: A Hands-On Guide

Key Features:

  • Learn penetration testing techniques specifically for AWS public cloud instances.
  • Go beyond identifying loopholes and automate security monitoring and alerting within your cloud-based deployment pipelines.
  • A step-by-step guide to securing your AWS Cloud environment using the most widely used security platform — Kali Linux.

Book Description: The shift to the cloud is inevitable, with AWS dominating the market. However, securing cloud environments, particularly on AWS, is still an art that needs refinement. This book is designed for penetration testers and system administrators who want a hands-on approach to testing AWS services, using Kali Linux. You’ll build a practice lab to test your skills, and refine your ability to perform white-box assessments on your cloud resources.

The book also dives deep into often-overlooked AWS services like serverless infrastructure and automated deployment pipelines. By the end of this guide, you'll have the knowledge to identify vulnerabilities and secure your AWS cloud environment.

What You Will Learn:

  • Penetrate the most common AWS services and identify potential flaws.
  • Audit your infrastructure to uncover weaknesses and vulnerabilities.
  • Learn how to demonstrate lateral and vertical movement within a compromised AWS account.
  • Maintain stealth and persistence inside a compromised AWS environment.
  • Master hands-on penetration testing techniques.
  • Use automated tools to continuously improve your AWS security posture.

Who This Book Is For: This book is for security analysts and penetration testers interested in securing cloud environments. A basic understanding of penetration testing, cloud computing, and security concepts is required.

Table of Contents:

  1. Setting Up a Pentesting Lab on AWS
  2. Setting Up a Kali PentestBox on the Cloud
  3. Exploitation on the Cloud using Kali Linux
  4. Setting Up Your First EC2 Instances
  5. Penetration Testing of EC2 Instances using Kali Linux
  6. Elastic Block Stores and Snapshots - Retrieving Deleted Data
  7. Reconnaissance - Identifying Vulnerable S3 Buckets
  8. Exploiting Permissive S3 Buckets for Fun and Profit
  9. Identity Access Management on AWS
  10. Privilege Escalation of AWS Accounts Using Stolen Keys, Boto3, and Pacu
  11. Using Boto3 and Pacu to Maintain AWS Persistence
  12. Security and Pentesting of AWS Lambda
  13. Pentesting and Securing AWS RDS
  14. Targeting Other Services
  15. Pentesting CloudTrail
  16. GuardDuty
  17. Using Scout Suite for AWS Security Auditing
  18. Using Pacu for AWS Pentesting
  19. Putting it All Together - Real-World AWS Pentesting

📎 Amazon Link

Add to cart
Size
35.5 MB
Length
681 pages
Copy product URL