AWS Pentest Methodology
Type of Access
White Box Access
Read or view permissions to all accounts in scope
Console + API Keys
Assumed Breach Access
Compromised developer IAM user/role
EC2 or Lambda roles
Leaked access keys
Whatever situation the client is most worried about
Opinion: Blackbox cloud penetration testing is wasting money on gathering context
Automated Tools and Resources
Use white-box access for automated tools that visualize resources and API usage in the account
Low Hanging Fruits
Perform an automated configuration review across every account
Tools like ScoutSuite, Prowler, CloudFox, Pacu, or a CSPM your client is using
Programmatically identify attack paths
Manual Context Gathering
Research and check for publicly known misconfigs or issues
Read AWS documentation for API calls, best practices, and features
Note attack paths to try
Dynamic Testing
Confirm/Disprove assumptions and theories dynamically
Write your findings
Bonus points for recommending architecture or guardrail changes instead of "wack-a-mole" fixes
REFERENCES
Last updated