8
Cloud Security Exploitation
Cloud adoption has significantly changed the way organizations collect, process, and store the data of end users. Some businesses automatically assume that their cloud providers will take care of their cybersecurity, but every cloud consumer, be it an individual or a business, must be aware that it’s a shared responsibility. Having said that, the majority of the time, when testers successfully get access to an internal network, they think they are almost done with the test, assuming they can then proceed to compromise the network or enterprise.
In this chapter, we will explore different types of attacks that pentesters can leverage if they gain a foothold into a cloud environment. In particular, we will explore ...
Get Mastering Kali Linux for Advanced Penetration Testing - Fourth Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.