Skip to content

jeremylaratro/cloud_pentesting_overview

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

40 Commits
 
 

Repository files navigation

Cloud Pentesting: Resource & Lab Collection

A curated compilation of cloud-focused penetration testing, red teaming, and offensive security resources. Contributions welcome via pull request.


Table of Contents


Overview

The major cloud providers and orchestration platforms covered by this collection:

  • Amazon Web Services (AWS)
  • Microsoft Azure / Entra ID (formerly Azure AD)
  • Google Cloud Platform (GCP)
  • Kubernetes
  • IBM Cloud
  • DigitalOcean

General Resources

Cheatsheets & Compilations

Methodologies & Encyclopedias

Awesome Lists

Training & Certifications

CTFs & Challenges


AWS

AWS: Resources

AWS: Tools

AWS: Labs

AWS: Key Topics

  • IAM users, roles, managed & inline policies, trust policies
  • S3 bucket ACLs, public objects, and SSE key misconfigurations
  • EC2 instance metadata (IMDSv1/v2), SSRF to credential theft
  • Lambda function permissions, environment variables, and API Gateway abuse
  • VPC, security groups, and peering misconfigurations
  • SNS/SES abuse for exfiltration and phishing
  • iam:PassRole + ec2:RunInstances privilege escalation via instance profiles
  • CloudTrail evasion and identity obfuscation techniques

AWS: First Lab Setup (High Level)

  1. Create an AWS account.
  2. In IAM, create a user/group with policies appropriate for your chosen lab (CloudGoat, for example, typically needs: AdministratorAccess, AmazonRDSFullAccess, IAMFullAccess, AmazonS3FullAccess, CloudWatchFullAccess, AmazonDynamoDBFullAccess).
  3. Confirm S3 bucket creation is permitted in the target region.
  4. Configure the AWS CLI locally with the access key, secret, and region from the IAM user you created.
  5. Enable S3 bucket ACLs if the lab requires them (set via bucket permissions).

Azure / Entra ID

Azure: Resources

Azure: Tools

Azure: Labs

Azure: Key Topics

  • Storage account blobs and public container misconfigurations
  • Azure Files / AFR shares
  • Leaked tokens and credentials in DevOps/Automation artifacts
  • Password spraying and OAuth device code / token-theft attacks against Entra ID
  • Privileged role elevation via PIM, service principals, and managed identities
  • Conditional Access and MFA bypass techniques
  • Consent phishing and illicit grant abuse against Microsoft 365

Google Cloud Platform (GCP)

GCP: Resources

GCP: Tools

GCP: Labs

GCP: Key Topics

  • IAM bindings, custom roles, and service account impersonation
  • iam.serviceAccounts.actAs and iam.serviceAccounts.getAccessToken privesc
  • Cloud Storage bucket ACL and public access misconfigurations
  • Cloud Functions and Cloud Run environment-variable / metadata abuse
  • Organization vs. project hierarchy boundary crossing

Kubernetes & Containers

Kubernetes: Resources

Kubernetes: Tools

Kubernetes: Labs

Kubernetes: Key Topics

  • Clusters, namespaces, and control plane exposure
  • RBAC roles, role bindings, and privilege escalation paths
  • Service account tokens, secrets, and auto-mounted credentials
  • Pod security (privileged pods, hostPath, hostNetwork, capabilities)
  • Container escape techniques and kubelet API abuse
  • Ingress, API server, and etcd exposure

Multi-Cloud Tools

Tools that apply across providers or are provider-agnostic.

Cloud C2 Frameworks


CI/CD & Infrastructure as Code

CI/CD pipelines and IaC are frequent initial-access and privilege-escalation vectors against cloud environments.

Resources

Tools


Research Blogs

Keep up with new cloud attack techniques and tooling.


Walkthroughs & Writeups

About

Cloud Pentesting Resource Collection

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors