LEARNING PATH
Attacking and Defending AWS

Emulate attackers’ tools and techniques to compromise AWS services and understand defensive mitigations to prevent these attacks.

HANDS-ON LABS
19
DIFFICULTY LEVEL
Intermediate

Learn how attackers compromise AWS environments

  • Compromise EC2 instances
  • Reduce the privileges of policies
  • Abuse Lambda Authorizers
  • Enumerate IAM users
Complete this learning path and earn a certificate of completion

Introduction

Amazon Web Services is the most popular cloud service provider in the world offering hundreds of services. With a large number of businesses adopting cloud technologies like AWS, cyber practitioners must understand the security implications of moving to the cloud.

This pathway will give you hands on access with common misconfigurations across AWS environments and understand defensive mitigations to prevent these attacks including

  • identifying, enumerating and exploiting overly permissive IAM users, roles and policies
  • exploring serverless infrastructure and common attack vectors present within these services
  • exploiting weaknesses in the most common AWS services including S3, EC2, VPC and more