Skip to content

Cloud computing refers to the delivery of computing services, including storage, processing power, and software, over the internet. Instead of owning and maintaining physical servers or hardware, users can access and use these resources on-demand from a cloud service provider.

aakashchauhn/Cloud-Pentest

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

2 Commits
Β 
Β 

Repository files navigation

Cloud-Pentest

Cloud computing refers to the delivery of computing services, including storage, processing power, and software, over the internet. Instead of owning and maintaining physical servers or hardware, users can access and use these resources on-demand from a cloud service provider.

  1. What is the cloud? | Cloud definition : https://www.cloudflare.com/learning/cloud/what-is-the-cloud/

  2. What is Learn to Cloud? : https://learntocloud.guide/docs/Welcome

Hacking Techniques

  1. https://csbygb.gitbook.io/pentips/cs-by-gb-pentips/readme

  2. Google Cloud Platform : https://csbygb.gitbook.io/pentips/cloud-pentest/gcp

  3. AWS : https://csbygb.gitbook.io/pentips/cloud-pentest/aws

  4. Introduction to Cloud Pentesting: https://www.hackthebox.com/blog/intro-cloud-pentesting

7.Hacking the cloud by Nick Frichette : https://hackingthe.cloud/

  1. Cloud Security - Attacks by : https://github.com/CyberSecurityUP/Cloud-Security-Attacks

  2. My AWS Pentest Methodology : https://medium.com/@MorattiSec/my-aws-pentest-methodology-14c333b7fb58

  3. Permission Mining in GCP - Colin Estep : https://www.youtube.com/watch?v=QIXZ0DS9arc

Read CTF write ups: 11. flAWS writeups by Nick Doyle : https://nick-p-doyle.medium.com/flaws-cloud-a-fun-interactive-way-to-learn-the-basics-of-aws-security-19463c2b6ece

  1. EC2 SSRF - Writeup https://medium.com/@vulnmachines/ec2-ssrf-vulnmachines-walkthrough-be382b83b0f6

  2. Vulnerable Lambda : https://medium.com/@vulnmachines/vulnerable-lambda-vulnmachines-walkthrough-529d2fd3363c

  3. Misconfigured Bucket : https://medium.com/@vulnmachines/misconfigured-bucket-vulnmachines-lab-walkthrough-509b0faa6779

  4. Special Policy Bucket : https://medium.com/@vulnmachines/special-policy-bucket-vulnmachines-walkthrough-3e4927c416e9

  5. Open AWS S3 bucket leaks all Images uploaded to Zomato by yashrs on Hackerone: https://hackerone.com/reports/507097

  6. CVE-2019-5736: Escape from Docker and Kubernetes containers to root on host by adam_iwaniuk on Hackerone: https://hackerone.com/reports/495495

𝗣π—₯π—”π—–π—§π—œπ—–π—˜

  1. Free Lab: https://www.linkedin.com/posts/pentesteracademy_lab-manual-cloud-security-101-ctf-activity-6978654049411719168-Jhf3/?utm_source=share&utm_medium=member_ios

  2. flAWS : http://flaws.cloud.s3-website-us-west-2.amazonaws.com/

  3. Insekube by congo4tor : https://tryhackme.com/room/insekube

About

Cloud computing refers to the delivery of computing services, including storage, processing power, and software, over the internet. Instead of owning and maintaining physical servers or hardware, users can access and use these resources on-demand from a cloud service provider.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published