O'Reilly logo

Metasploit Penetration Testing Cookbook - Second Edition by Abhinav Singh, Monika Agarwal

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Appendix A. Pentesting in the Cloud

In this appendix, we will cover:

  • Pentesting in the cloud
  • Pentesting in the cloud with hackaserver.com

Introduction

Cloud computing is like distributed computing over a network that possesses the ability to run a program on many connected machines simultaneously. In cloud computing, the word cloud is used as a metaphor for the Internet, so cloud computing means a kind of Internet-based computing, where different services are delivered to an organization's computers and devices via the Internet.

Currently the standards needed to make cloud computing work are not fully defined, and thus has left many companies to define their own cloud computing technologies. Penetration testing the cloud can make for tricky waters ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required