Poking Holes in the Cloud: Auditing AWS Security - 2018

Poking Holes in the Cloud: Auditing AWS Security - 2018

LASCON via YouTube Direct link

Pentesting Methodology

6 of 22

6 of 22

Pentesting Methodology

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Poking Holes in the Cloud: Auditing AWS Security - 2018

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 About Me
  3. 3 About the Topic
  4. 4 Pentesting
  5. 5 NetSec DevOps
  6. 6 Pentesting Methodology
  7. 7 Phase 1 Reconnaissance
  8. 8 DNS Recon Tools
  9. 9 AWS Buckets
  10. 10 Recon Tools
  11. 11 Proves Check
  12. 12 Phase 3 Exploits
  13. 13 Billing App
  14. 14 Metadata Server
  15. 15 GraphQL
  16. 16 Kubernetes
  17. 17 Lambda Hack
  18. 18 Pakku
  19. 19 Metasploit
  20. 20 fingerprinting
  21. 21 What we learned
  22. 22 What to take away

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.