Table of Contents
Preface
Section 1: Setting Up AWS and Pentesting Environments
Chapter 1: Building Your AWS Environment
Technical requirements
Exploring Amazon Web Services (AWS)
AWS security and penetration testing
Understanding our testing environment
Configuring your environment
Setting up an account
Setting up EC2 instances
Setting up an EC2 instance with CentOS
Setting up a Windows host
Attacker setup – setting up a Kali instance
Connecting with PuTTY
Exploring vulnerable services
Discovering vulnerable services
Creating vulnerable services
Attacking vulnerabilities
Exploring Metasploit
The AWS Command Line Interface (CLI)
Installing the AWS CLI
Exploring basic AWS CLI commands
Summary
Further reading
Chapter 2: Pentesting and Ethical ...
Get AWS Penetration Testing now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.