Book info – Hands-On AWS Penetration Testing with Kali Linux
Disclaimer: Working through this book will use AWS, which costs money. Make sure you are doing things to manage your costs. If I remember, I’ll keep up with my costs to help get a general idea. But prices can change at any time, so major grain of salt.
Disclaimer #2: Jail is bad. Cybercrime is illegal. Educational purposes. IANAL. Don’t do things you shouldn’t. Etc.
Overall book review – Start here for tips on working through the book effectively.
Section 1: Kali Linux on AWS
Section 2: Pentesting AWS Elastic Compute Cloud, Configuring, and Securing
Section 3: Pentesting AWS Simple Storage Service Configuring and Securing
Section 4: AWS Identity Access Management Configuring and Securing
Section 5: Penetration Testing on Other AWS Services
- Ch 12 – Security and Pentesting of AWS Lambda
- Ch 13 – Pentesting and Securing AWS RDS
- Ch 14 – Targeting Other Services
Section 6: Attacking AWS Logging and Security Services
Section 7: Leveraging AWS Pentesting Tools for Real-World Attacks