Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Introduction to AWS Pentesting
1.0 Welcome To The Course!
1.1 Welcome & Expectations (2:03)
1.2 About Your Instructor (2:45)
1.3 Prerequisites for the Course (2:56)
1.4 Support for the Course
2.0 Configuring the Lab Environment
2.1 Creating a Free Tier AWS Account (7:14)
2.2 Setting up Budget Alerts (3:23)
2.3 Installing and Configuring the AWS CLI (3:37)
2.4 Enabling Autocomplete for the AWS CLI
2.5 Installing CloudGoat (12:58)
2.6 Installing Pacu (4:36)
2.7 Creating Free Accounts on Cybr and Pwned Labs (5:50)
3.0 IAM The Admin Now (Understanding IAM in AWS)
3.1 IAM for Pentesters (12:52)
3.2 IAM Enumeration Cheat Sheet
3.3 Lab Introduction and Set Up (3:02)
3.4 User and Policy Enumeration (10:43)
3.5 Group and Role Enumeration (11:57)
3.6 [Challenge Lab] Use Pacu to Automate Enumeration
3.7 [Walkthrough] Use Pacu to Automate Enumeration (10:44)
3.8 IAM Section Quiz
4.0 Your Bucket Is Leaking... (Attacking S3 Buckets)
4.1 S3 for Pentesters (10:35)
4.2 S3 Bucket Enumeration Cheat Sheet
4.3 Lab Introduction and Set Up (3:21)
4.4 Identifying, Listing, and Downloading from Buckets (7:47)
4.5 [Challenge Lab] Find Exposed Credit Card Numbers
4.6 [Walkthrough] Find Exposed Credit Card Numbers (8:39)
4.7 S3 Section Quiz
5.0 Dysfunctional Functions (Attacking Lambda Functions)
5.1 Lambda for Pentesters (8:14)
5.2 Lambda Enumeration Cheat Sheet
5.3 Lab Introduction and Set Up (4:38)
5.4 Lambda Enumeration (Console) (9:07)
5.5 Lambda Enumeration (CLI / Pacu) (9:58)
5.6 [Challenge Lab] Enumerate Permissions of Leaked Credentials
5.7 [Walkthrough] Enumerate Permissions of Leaked Credentials (8:19)
5.8 (Optional) Destroy the Cloudgoat Scenario
5.9 Lambda Section Quiz
6.0 My Other Computer Is Your EC2 (Attacking EC2 Instances)
6.1 EC2s for Pentesters (7:44)
6.2 EC2 Enumeration Cheat Sheet
6.3 Lab Introduction and Set Up (3:03)
6.4 EC2 Enumeration (Console) (9:00)
6.5 EC2 Enumeration (CLI / Pacu) (11:11)
6.6 [Challenge Lab] Abuse SSRF and Access the S3 Bucket
6.7 [Walkthrough] Identifying and Abusing the SSRF Vulnerability (9:47)
6.8 [Walkthrough] Discovering Credentials and Invoking the Lambda Function (8:29)
6.9 Destroy the Cloudgoat Scenario
6.10 EC2 Section Quiz
7.0 AWS Privilege Escalation
7.1 Overview of Privilege Escalation in AWS (11:42)
7.2 Privilege Escalation Cheat Sheet
7.3 Lab Introduction and Set Up (3:40)
7.4 [Challenge Lab] Enumerating Policies and Permissions
7.5 [Walkthrough] Enumerating Policies and Permissions (7:44)
7.6 [Challenge Lab] Hunting for Roles and Role Permissions
7.7 [Walkthrough] Hunting for Roles and Role Permissions (9:46)
7.8 [Challenge Lab] Assuming the Target Role and Privilege Escalation
7.9 [Walkthrough] Assuming the Target Role and Privilege Escalation (12:04)
7.10 Destroy the Cloudgoat Scenario
7.11 Privilege Escalation Section Quiz
8.0 Capstone Challenge #1: Beanstalk Secrets
8.1 Lab Introduction and Set Up (4:04)
8.2 [Capstone Challenge] Beanstalk Secrets
8.3 [Walkthrough] Beanstalk Secrets (20:39)
8.4 Submit Your Walkthrough
9.0 Capstone Challenge #2: SNS Secrets
9.1 Lab Introduction and Set Up (5:16)
9.2 [Capstone Challenge] SNS Secrets
9.3 [Walkthrough] SNS Secrets (20:25)
9.4 Submit Your Walkthrough
10.0 Course Conclusion
10.1 Next Steps For Your Career (9:46)
10.2 Tell Us What You Think 💙
6.9 Destroy the Cloudgoat Scenario
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock