Book description
Identify tools and techniques to secure and perform a penetration test on an AWS infrastructure using Kali Linux
Key Features
- Efficiently perform penetration testing techniques on your public cloud instances
- Learn not only to cover loopholes but also to automate security monitoring and alerting within your cloud-based deployment pipelines
- A step-by-step guide that will help you leverage the most widely used security platform to secure your AWS Cloud environment
Book Description
The cloud is taking over the IT industry. Any organization housing a large amount of data or a large infrastructure has started moving cloud-ward - and AWS rules the roost when it comes to cloud service providers, with its closest competitor having less than half of its market share. This highlights the importance of security on the cloud, especially on AWS. While a lot has been said (and written) about how cloud environments can be secured, performing external security assessments in the form of pentests on AWS is still seen as a dark art.
This book aims to help pentesters as well as seasoned system administrators with a hands-on approach to pentesting the various cloud services provided by Amazon through AWS using Kali Linux. To make things easier for novice pentesters, the book focuses on building a practice lab and refining penetration testing with Kali Linux on the cloud. This is helpful not only for beginners but also for pentesters who want to set up a pentesting environment in their private cloud, using Kali Linux to perform a white-box assessment of their own cloud resources. Besides this, the book covers a large variety of AWS services that are often overlooked during a pentest - from serverless infrastructure to automated deployment pipelines.
By the end of this book, you will be able to identify possible vulnerable areas efficiently and secure your AWS cloud environment.
What you will learn
- Familiarize yourself with and pentest the most common external-facing AWS services
- Audit your own infrastructure and identify flaws, weaknesses, and loopholes
- Demonstrate the process of lateral and vertical movement through a partially compromised AWS account
- Maintain stealth and persistence within a compromised AWS account
- Master a hands-on approach to pentesting
- Discover a number of automated tools to ease the process of continuously assessing and improving the security stance of an AWS infrastructure
Who this book is for
If you are a security analyst or a penetration tester and are interested in exploiting Cloud environments to reveal vulnerable areas and secure them, then this book is for you.
A basic understanding of penetration testing, cloud computing, and its security concepts is mandatory.
Table of contents
- Title Page
- Copyright and Credits
- About Packt
- Contributors
- Preface
- Section 1: Kali Linux on AWS
- Setting Up a Pentesting Lab on AWS
- Setting Up a Kali PentestBox on the Cloud
- Exploitation on the Cloud using Kali Linux
- Section 2: Pentesting AWS Elastic Compute Cloud Configuring and Securing
- Setting Up Your First EC2 Instances
-
Penetration Testing of EC2 Instances using Kali Linux
- Technical requirements
- Installing a vulnerable service on Windows
- Scanning and reconnaissance using Nmap
- Identifying and fingerprinting open ports and services using Nmap
- Performing an automated vulnerability assessment using Nexpose
- Using Metasploit for automated exploitation
- Using Meterpreter for privilege escalation, pivoting, and persistence
- Summary
- Further reading
- Elastic Block Stores and Snapshots - Retrieving Deleted Data
- Section 3: Pentesting AWS Simple Storage Service Configuring and Securing
- Reconnaissance - Identifying Vulnerable S3 Buckets
- Exploiting Permissive S3 Buckets for Fun and Profit
- Section 4: AWS Identity Access Management Configuring and Securing
- Identity Access Management on AWS
- Privilege Escalation of AWS Accounts Using Stolen Keys, Boto3, and Pacu
- Using Boto3 and Pacu to Maintain AWS Persistence
- Section 5: Penetration Testing on Other AWS Services
- Security and Pentesting of AWS Lambda
- Pentesting and Securing AWS RDS
- Targeting Other Services
- Section 6: Attacking AWS Logging and Security Services
- Pentesting CloudTrail
- GuardDuty
- Section 7: Leveraging AWS Pentesting Tools for Real-World Attacks
- Using Scout Suite for AWS Security Auditing
-
Using Pacu for AWS Pentesting
- Pacu history
- Getting started with Pacu
-
Pacu commands
- list/ls
- search [[cat]egory] <search term>
- help
- help <module name>
- whoami
- data
- services
- data <service>|proxy
- regions
- update_regions
- set_regions <region> [<region>...]
- run/exec <module name>
- set_keys
- swap_keys
- import_keys <profile name>|--all
- exit/quit/Ctrl + C
- aws <command>
- proxy <command>
- Creating a new module
- An introduction to PacuProxy
- Summary
- Putting it All Together - Real - World AWS Pentesting
- Other Books You May Enjoy
Product information
- Title: Hands-On AWS Penetration Testing with Kali Linux
- Author(s):
- Release date: April 2019
- Publisher(s): Packt Publishing
- ISBN: 9781789136722
You might also like
book
Mastering Kali Linux for Advanced Penetration Testing - Third Edition
A practical guide to testing your infrastructure security with Kali Linux, the preferred choice of pentesters …
book
Web Penetration Testing with Kali Linux - Third Edition
Build your defense against web attacks with Kali Linux, including command injection flaws, crypto implementation layers, …
book
Kali Linux Penetration Testing Bible
Your ultimate guide to pentesting with Kali Linux Kali is a popular and powerful Linux distribution …
book
Hands-On Web Penetration Testing with Metasploit
Identify, exploit, and test web application security with ease Key Features Get up to speed with …