OPS-02
Breaking the cloud: Finding and exploiting misconfigurations in AWS
Misconfigurations are among the most common security gaps in cloud environments, often leading to severe breaches. In this session, we’ll dive into the world of AWS penetration testing, focusing on identifying and exploiting these misconfigurations to understand their impact.
We’ll cover:
- Where to start with AWS pentesting, including key attack surfaces.
- Tools like CloudFox, Prowler, Pacu and others to discover vulnerabilities and insecure configurations.
- Real-world privilege escalation examples to demonstrate common attack paths.