Chapter 9: Real-Life Pentesting with Metasploit and More!

Up until now, we have looked at how various services are set up and how we can modify and exploit them – as well as having discussed simple solutions for how we can recommend fixing them. Now we are going to be moving forward quite significantly and will apply our knowledge of pentesting. We will use AWS and tools such as Metasploit to help us leverage exploiting vulnerabilities within AWS environments. This chapter will take on a real-life approach to how you would pentest AWS environments in a real-world setting.

We will do some basic setups of new systems to mimic common vulnerabilities, as well as looking at some of the images we set up in previous chapters. We will run through real-life ...

Get AWS Penetration Testing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.