Back to Course

Pentesting AWS Environments with Pacu, CloudGoat, and ChatGPT

0% Complete
0/0 Steps
  1. Introduction

    About the course and author
  2. About using CloudGoat, Pacu, and ChatGPT
  3. Who this course is for
  4. Important quick note on AWS resource pricing
  5. [LAB] Create a billing alert to avoid surprise bills
  6. We want your feedback
  7. Setting up our lab environment
    Read this before installing Pacu/CloudGoat!
  8. [DEMO] Pacu [Option #1] Install with pip [Recommended]
  9. [DEMO] Pacu [Option #2] Use with Docker
  10. [DEMO] CloudGoat [Option #1] Install with Git
  11. [DEMO] CloudGoat [Option #2] Running with Docker
  12. [DEMO] Configuring AWS access credentials for CloudGoat
  13. [DEMO] Configuring AWS access credentials
  14. Getting started with Pacu
    Pacu Quick Start Guide
  15. IAM Privilege Escalation by Misconfiguration (Small / Easy)
    Scenario overview
  16. [DEMO] Admin privilege escalation demonstration
  17. [DEMO] Cleaning up our lab environment
  18. Vulnerable Lambda (Small / Easy)
    Scenario overview
  19. [DEMO] Creating our lab environment
  20. [DEMO] Exploiting vulnerable Lambda functions for admin access
  21. [DEMO] Cleaning up our lab environment
  22. [Cheat Sheet] Solution steps (CLI)
  23. [LAB] [CTF] Lambda SQLi PrivEsc to Access Secret
  24. IAM Privilege Escalation by Rollback (Small / Easy)
    Scenario overview
  25. [DEMO] Exploiting IAM versions
  26. [DEMO] Cleaning up our lab environment
  27. [Cheat Sheet] Solution steps (CLI)
  28. [LAB] [CTF] PrivEsc via IAM Version Rollback
  29. Cloud Breach via S3 (Small / Moderate)
    Scenario walkthrough
  30. [LAB] [DEMO] Exploiting EC2 to reach S3
  31. Preventing this exploit
  32. Cleaning up our lab environment
  33. [Cheat Sheet] Solution steps (CLI)
  34. ECS Takeover (Medium / Moderate)
    Scenario walkthrough
  35. [DEMO] ECS RCE exploit to get credentials
  36. [DEMO] ECS Takeover
  37. [DEMO] Cleaning up our lab environment
  38. [Cheat Sheet] Solution steps (CLI)
  39. Wrap-up and Key Takeaways
    What's next?
  40. We want your feedback

Disclaimer

This course teaches techniques that can cause damage and harm to AWS accounts and resources. What we will demonstrate is perfectly safe, legal, and conformant to AWS terms of service, so long as you stick to our instructions, scenarios, our labs, and/or your own lab environments. Do NOT use these tactics against production accounts/resources while you are learning, and do not use them against organizations that have not provided you with explicit written permission. I will provide further instructions for this as we get started with the course so that you can safely create a separate AWS account to ensure isolation from production resources, but I want to make it very clear that this course is strictly for white hats and ethical hacking.

About the tools we’re going to use

As the title of this course implies, we’re going to be using 4 primary tools:

  • CloudGoat
  • Pacu
  • ChatGPT
  • AWS CLI

In order to pentest various types of vulnerable AWS environments.

But how exactly are we going to use these tools? And if you’re not already familiar with them, what are they used for? Let’s take a look.

CloudGoat

CloudGoat is a vulnerable-by-design AWS deployment tool that can be used to create and configure intentionally vulnerable AWS environments. It’s a learning tool that provides a safe and legal sandbox for conducting security research, penetration testing, and assessment of your AWS environment’s security. This is a great tool to practice identifying and exploiting various types of security vulnerabilities in AWS environments.

The environments created by CloudGoat are vulnerable by design, and they contain security weaknesses that can be exploited to simulate real-world attacks. This enables you to learn about different types of security vulnerabilities and how they can be exploited in a controlled environment.

Examples of scenarios we can generate include:

  • Misconfigured S3 buckets
  • Compromised AWS credentials
  • Misconfigured cloud instances
  • Misconfigured containers
  • Etc…

We’ll be using CloudGoat modules in this course — one per section — to provide a hands-on AWS security learning experience. Yup, that means you will be going through these scenarios step-by-step instead of just watching me do it.

You’ll learn how to identify and exploit different types of security vulnerabilities in AWS environments which is a skill you can then directly apply on the job. That means the next time you see a vulnerable IAM policy, you can not only detect it, but you can also create a proof of concept for the rest of your team and upper management.

To build these skills and to find these vulnerabilities, we’ll make use of two other tools, one of which is called Pacu.

Pacu

Pacu is an open-source AWS exploitation framework that helps pentesters and security researchers assess the security of their AWS environments.

Pacu is highly modular and extensible, means that we can even create our own custom modules to extend its capabilities if we need to. Don’t let that intimidate you, though, because it includes many pre-built modules that can be used to perform a variety of attacks that we will use throughout this course, like:

  • Enumeration
  • Privilege escalation
  • Data exfiltration
  • Etc…

In this course, we’ll be using Pacu to perform a number of different types of attacks against vulnerable AWS environments.

With that said, we won’t just be using Pacu. Sometimes it’s easier and more practical to just use the AWS CLI, so we’ll be combining both approaches to switch back and forth and to show you that there are multiple approaches we can use.

ChatGPT

I highly doubt this is the first time you’ve heard of ChatGPT, so I’ll focus more on how we’ll be using it in this course.

ChatGPT is an amazingly useful AI tool that can help us when we get stuck. It’s generative AI, which means that the responses I get could be different from the responses you get. Sometimes completely different. The point, then, is not to use it so that you can copy/paste the results that I get into your terminal, but instead, the point is to teach you how you can use ChatGPT with the AWS CLI, Pacu, and CloudGoat to troubleshoot, and craft commands.

That way, once you’re done with the course, you can take those new ChatGPT skills and the types of prompts that I’ll show you to take it further and continue your learning.

Conclusion

That’s it for this lesson, I just wanted to give a quick overview of what you’ll be learning and using in this course. Now, let’s complete this lesson, and let’s move on to the next.

Responses

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.