Register for Tyler’s course with my link here and I’ll send you my study notes.
1.3 Installing Pre-Requisites
Intro to AWS Pentesting
www.cpatocybersecurity.com/p/aws-pentesting-1-0-installing-pre-requisites
2.1-2.7 Configuring the Lab Environment
www.cpatocybersecurity.com/p/aws-pentesting-2-0-configuring-the-lab-environment
3.1-3.5: IAM Enumeration Attack Chain - From Developer to Full S3 Access
CYBR lab in Intro to AWS Pentesting by Tyler Ramsbey
www.cpatocybersecurity.com/p/aws-pentesting-3-5-iam-enumeration-attack-chain-from-developer-to-full-s3-access
3.6-3.7 Challenge Lab: Use Pacu to Automate Enumeration
www.cpatocybersecurity.com/p/aws-pentesting-3-6-challenge-lab-use-pacu-to-automate-enumeration
4.1-4.4 AWS S3 Enumeration Basics (Pwned Labs)
www.cpatocybersecurity.com/p/4-1-4-4-aws-s3-enumeration-basics-pwned-labs
4.5-4.6 Exposing Credit Card Data Through S3 Misconfiguration
www.cpatocybersecurity.com/p/4-5-4-6-exposing-credit-card-data-through-s3-misconfiguration
5.1-5.5 Lambda Enumeration: Exploiting AWS EC2_SSRF CloudGoat Scenario
www.cpatocybersecurity.com/p/5-1-5-5-lambda-enumeration-exploiting-aws-ec2-ssrf-cloudgoat-scenario
5.6-5.8 From Lambda Leaks to EC2 Access
www.cpatocybersecurity.com/p/5-6-5-8-from-lambda-leaks-to-ec2-access
6.1-6.5 EC2 SSRF Challenge: From Virtual Machine Enumeration to Full Cloud Compromise
www.cpatocybersecurity.com/p/6-1-6-5-ec2-ssrf-challenge-from-virtual-machine-enumeration-to-full-cloud-compromise
6.6-6.7 Abuse SSRF and Access the S3 Bucket
www.cpatocybersecurity.com/p/6-6-6-7-abuse-ssrf-and-access-the-s3-bucket
6.8 Exploiting EC2 SSRF to Achieve Lambda Invocation - CloudGoat
www.cpatocybersecurity.com/p/6-8-exploiting-ec2-ssrf-to-achieve-lambda-invocation-cloudgoat
7.1-7.5 Privilege Escalation in AWS Lambda
www.cpatocybersecurity.com/p/7-1-7-5-privilege-escalation-in-aws-lambda
7.6-7.7 IAM Role Privilege Escalation in CloudGoat Lambda Attack
www.cpatocybersecurity.com/p/7-6-7-7-iam-role-privilege-escalation-in-cloudgoat-lambda-attack
7.8-7.10 [Challenge Lab] Assuming the Target Role and Privilege Escalation
www.cpatocybersecurity.com/p/7-8-7-10-challenge-lab-assuming-the-target-role-and-privilege-escalation
8.1-8.4 Capstone Challenge: Cloudgoat Beanstalk Secrets
www.cpatocybersecurity.com/p/aws-elastic-beanstalk-security-pen-test-cloudgoat
9.1-9.3 Capstone Challenge #2 SNS Secrets
www.cpatocybersecurity.com/p/9-1-9-3-capstone-challenge-2-sns-secrets