This is an interim version of our Electronic Legal Deposit Catalogue-eJournals and eBooks while we continue to recover from a cyber-attack.
Hands-On AWS Penetration Testing with Kali Linux : Set up a Virtual Lab and Pentest Major AWS Services, Including EC2, S3, Lambda, and CloudFormation.: Set up a Virtual Lab and Pentest Major AWS Services, Including EC2, S3, Lambda, and CloudFormation. (2019)
Record Type:
Book
Title:
Hands-On AWS Penetration Testing with Kali Linux : Set up a Virtual Lab and Pentest Major AWS Services, Including EC2, S3, Lambda, and CloudFormation.: Set up a Virtual Lab and Pentest Major AWS Services, Including EC2, S3, Lambda, and CloudFormation. (2019)
Main Title:
Hands-On AWS Penetration Testing with Kali Linux : Set up a Virtual Lab and Pentest Major AWS Services, Including EC2, S3, Lambda, and CloudFormation.
Table of ContentsSetting Up a Pentesting Lab on AWSSetting Up a Kali PentestBox on the CloudExploitation on the Cloud using Kali LinuxSetting Up Your First EC2 InstancesPenetration Testing of EC2 Instances using Kali LinuxElastic Block Stores and Snapshots - Retrieving Deleted DataReconnaissance - Identifying Vulnerable S3 BucketsExploiting Permissive S3 Buckets for Fun and ProfitIdentity Access Management on AWSPrivilege Escalation of AWS Accounts Using Stolen Keys, Boto3, and PacuUsing Boto3 and Pacu to Maintain AWS PersistenceSecurity and Pentesting of AWS LambdaPentesting and Securing AWS RDSTargeting Other ServicesPentesting CloudTrailGuardDutyUsing Scout Suite for AWS Security AuditingUsing Pacu for AWS PentestingPutting it All Together - Real - World AWS Pentesting.
Note: Online resource; title from PDF title page (EBSCO, viewed July 22, 2019)
Access Rights:
Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
Access Usage:
Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.