Chapter 12: Other Projects with AWS

To conclude this book, I wanted to make a brief mention of two other different projects that are good to note and dig into. Throughout this book, we have taken quite a bit of a high-level view as well as a bunch of low-level views (hands-on portions) to create a cohesive understanding of pentesting and what it means to AWS. This final chapter is going to discuss an open source framework that is used by red teamers, penetration testers, and ethical hackers that allows businesses to test real adversary tactics and methods on their organizations – to ultimately better the controls and defenses by locating areas of weakness. We will then end with a fun exercise that came from a phishing project I came up with ...

Get AWS Penetration Testing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.