AWS
Amazon Web Services
AWS Cloud Pentesting Playbook
1. AWS Foundations (for Red Teamers)
1.1 Control plane vs data plane
1.2 Identities & credentials
1.3 AWS CLI & profiles (quick mastery)
2. Red Team Methodology in AWS (end-to-end)
3. Information Gathering & Enumeration
3.1 Account & caller validation
3.2 Identity (IAM) surface
3.3 Compute, storage, serverless inventory
3.4 Logging, detection & posture
4. Initial Access
4.1 SSRF → IMDS (v1 & v2) credential theft
4.1.1 Manual IMDS checks (from inside an instance)
4.1.2 SSRF step-by-step (red team path)
4.2 Leaked keys & public resource abuse (quick wins)
5. Privilege Escalation (IAM)
6. Post-Exploitation Objectives
6.1 Data discovery & exfiltration
6.2 Serverless & APIs
6.3 EC2 artifacts (user-data, instance profile, disks)
6.4 KMS, Secrets, SSM
7. Lateral Movement
7.1 Cross-account pivots (role chains)
7.2 Service pivots (containers & clusters)
8. Persistence (ethical use in labs only)
9. Detection, Hardening & OPSEC quick wins
9.1 Instance Metadata (IMDS)
9.2 GuardDuty & CloudTrail hygiene
9.3 SCPs & boundaries
10. Real-World-Style Scenarios (all specifics redacted)
10.1 SSRF → IMDSv1 → STS creds → S3 data
10.2 IAM graph Q&A exploration (groups, inline policies, role trust)
10.3 Role-pivot (assumable by devops-role)
11. Service-by-Service Attack & Defend (condensed)
11.1 S3
11.2 EC2 & Networking
11.3 Lambda & API Gateway
11.4 ECR/EKS
11.5 RDS/DynamoDB
11.6 Secrets/KMS/SSM
12. Cloud Observability & Response (what to watch)
13. AWS CLI Power-User Notes (HackingThe.Cloud extracts)
14. Deep Dive: IMDSv1 vs IMDSv2 (don’t skip this)
15. Build-Your-Own Labs (safe practice)
Appendix A — Quick Command Index (by phase)
A.1 Info-gathering
A.2 Exploitation & privesc
A.3 Post-exploitation
A.4 Lateral movement & persistence
Last updated