March 2022
Intermediate to advanced
752 pages
18h 47m
English
In this chapter, we cover the following topics:
• Describing AWS, its architecture, and some best practices
• Abusing AWS authentication types
• Leveraging attacker tools to enumerate and look for backdoors
• Building ongoing persistence on EC2 Compute through backdooring AWS
Amazon Web Services (AWS) was created in 2006 as a side business to the main Amazon business. It was created to fulfill an internal need from the Amazon website to provide scale to its web properties.1 Since that time, AWS has dominated the market, although that market share is slowly decreasing. Chances are, you are interacting with AWS without realizing it for many of the day-to-day tasks you perform.
This chapter ...