Attaking and defending AWS
Tryhackme
How attackers compromise AWS environments
How attackers compromise AWS environments
Compromise EC2 instances
Reduce the privileges of policies
Abuse Lambda Authorizers
Enumerate IAM users
LEVEL: INTERMEDIATE
LEVEL: INTERMEDIATE
SECTION 1 - Introduction to AWS
SECTION 1 - Introduction to AWS
AWS: Cloud 101
AWS Basic Concepts
SECTION 2 - Introduction to IAM
SECTION 2 - Introduction to IAM
Introduction to AWS IAM
IAM Principals
IAM Permissions
IAM Credentials
The Quest for Least Privilege
STS Credentials Lab
SECTION 3 - Attacking and Defending Core Services
SECTION 3 - Attacking and Defending Core Services
AWS S3 - Attack and Defense
Amazon EC2 - Attack & Defense
Amazon EC2 - Data Exfiltration
AWS VPC - Attack and Defense
AWS VPC - Data Exfiltration
AWS Encryption Services
SECTION 4 - Attacking and Defending Serverless
SECTION 4 - Attacking and Defending Serverless
SECTION 5 - IAM Privilege Escalation
SECTION 5 - IAM Privilege Escalation
AWS IAM Initial Access
AWS IAM Enumeration