AWS Pentest Methodology

Type of Access

White Box Access

  • Read or view permissions to all accounts in scope

  • Console + API Keys

Assumed Breach Access

  • Compromised developer IAM user/role

  • EC2 or Lambda roles

  • Leaked access keys

  • Whatever situation the client is most worried about

Opinion: Blackbox cloud penetration testing is wasting money on gathering context

Automated Tools and Resources

Use white-box access for automated tools that visualize resources and API usage in the account

Low Hanging Fruits

  • Perform an automated configuration review across every account

  • Tools like ScoutSuite, Prowler, CloudFox, Pacu, or a CSPM your client is using

  • Programmatically identify attack paths

Manual Context Gathering

  • Research and check for publicly known misconfigs or issues

  • Read AWS documentation for API calls, best practices, and features

  • Note attack paths to try

Dynamic Testing

  • Confirm/Disprove assumptions and theories dynamically

  • Write your findings

  • Bonus points for recommending architecture or guardrail changes instead of "wack-a-mole" fixes


REFERENCES

Last updated