mirror of
https://github.com/The-Art-of-Hacking/h4cker
synced 2024-11-10 05:34:12 +00:00
Update README.md
This commit is contained in:
parent
fbe93f6e7b
commit
3bf2b4a981
1 changed files with 1 additions and 5 deletions
|
@ -7,14 +7,10 @@
|
||||||
* [Google Cloud Security Center](https://cloud.google.com/security)
|
* [Google Cloud Security Center](https://cloud.google.com/security)
|
||||||
* [High-level Best Practices when Performing Pen Testing in Cloud Environments](high_level_best_practices_pen_testing.md)
|
* [High-level Best Practices when Performing Pen Testing in Cloud Environments](high_level_best_practices_pen_testing.md)
|
||||||
|
|
||||||
## Additional AWS Pen Testing References
|
|
||||||
- [PENETRATION TESTING AWS STORAGE: KICKING THE S3 BUCKET](https://rhinosecuritylabs.com/penetration-testing/penetration-testing-aws-storage/) - Written by Dwight Hohnstein from [Rhino Security Labs](https://rhinosecuritylabs.com/).
|
|
||||||
- [AWS PENETRATION TESTING PART 1. S3 BUCKETS](https://www.virtuesecurity.com/blog/aws-penetration-testing-s3-buckets/) - Written by [@VirtueSecurity](https://twitter.com/VirtueSecurity).
|
|
||||||
- [AWS PENETRATION TESTING PART 2. S3, IAM, EC2](https://www.virtuesecurity.com/blog/aws-penetration-testing-part-2-s3-iam-ec2/) - Written by [@VirtueSecurity](https://twitter.com/VirtueSecurity).
|
|
||||||
|
|
||||||
## Vulnerables
|
## Vulnerables
|
||||||
- [CloudGoat](https://github.com/RhinoSecurityLabs/cloudgoat)
|
- [CloudGoat](https://github.com/RhinoSecurityLabs/cloudgoat)
|
||||||
- [Damn Vulnerable Cloud Application(DVCA)](https://github.com/m6a-UdS/dvca)
|
- [Damn Vulnerable Cloud Application(DVCA)](https://github.com/m6a-UdS/dvca)
|
||||||
|
- [PENETRATION TESTING AWS STORAGE: KICKING THE S3 BUCKET](https://rhinosecuritylabs.com/penetration-testing/penetration-testing-aws-storage/) - Written by Dwight Hohnstein from [Rhino Security Labs](https://rhinosecuritylabs.com/).
|
||||||
|
|
||||||
## Additional Tools
|
## Additional Tools
|
||||||
- [Taken - Takeover AWS Ips And Have A Working POC For Subdomain Takeover](http://feedproxy.google.com/~r/PentestTools/~3/bOdrVajU9Ns/taken-takeover-aws-ips-and-have-working.html)
|
- [Taken - Takeover AWS Ips And Have A Working POC For Subdomain Takeover](http://feedproxy.google.com/~r/PentestTools/~3/bOdrVajU9Ns/taken-takeover-aws-ips-and-have-working.html)
|
||||||
|
|
Loading…
Reference in a new issue