Cloud Pentesting for Noobs | General Hacking | Crax

Welcome To Crax.Pro Forum!

Check our new Marketplace at Crax.Shop

   Login! SignUp Now!
  • We are in solidarity with our brothers and sisters in Palestine. Free Palestine. To learn more visit this Page

  • Crax.Pro domain has been taken down!

    Alternatives: Craxpro.io | Craxpro.com

Cloud Pentesting for Noobs

Cloud Pentesting for Noobs

LV
1
 

F0rS3c

Member
Joined
Apr 24, 2023
Threads
12
Likes
7
Awards
4
Credits
3,016©
Cash
0$
Pentesting in the cloud is becoming a significant area for research and is quickly becoming a hot topic in the cybersecurity space. With companies continually moving their services to the cloud, checks, and balances in the cloud keep ramping up at a reasonably fast rate. However, what does it mean to conduct a penetration test on the cloud? Is it really a penetration test? Let’s take a look at these two terms:

Terms​

  • Penetration Testing on the Cloud: Testing on the cloud generally targets the applications and other services being built on the cloud platform. It could involve testing a Web Application being hosted on a server in the cloud, are perhaps another type of application being utilized by the cloud provider. You will test on the cloud with some formal pentest methodology and referencing the OWASP 10 ten.
  • Penetration Testing in the Cloud: Testing in the cloud typically involves testing the services associated with that particular cloud provider. For example, you may test the EC2 instances and the servers in those instances. You may also examine the storage file systems, such as S3, for issues configured by the administrators.
These will be two terms that you will need to remember when applying cloud penetration testing to your own methodology. Ensure that when you test, you know what you are testing, what the service or applications do, and that you don’t ever disrupt any services.

0*xeZiupF6V0ns1YM0.jpg

Image by BugRaptors

Why Cloud Testing?​

Why do we need cloud testing? For many different reasons that are fairly similar to the reason we have traditional penetration testing!

Compliance​

The checks and balances are typically maintained by compliance levels such as PCI-DSS or HIPAA. Auditors assess cloud networks for these types of compliance levels and can either pass or a fail a network based on the security of their infrastructure. A fail can result in more issues than one — such as not being able to operate that network which can lead to loss of revenue.

Pentesting for compliance ensures that 2 things:
1.​

Ensures that your network falls within compliance guidelines, and gives recommendations on pain points that need to be fixed to avoid falling out of compliance.

2.​

A penetration test gives you peace of mind on what an attacker could do with your network and a penetration test report highlights areas of weakness. At times, depending on your network, a penetration test report shows critical issues that can result in immediate damage to your company — and shows ways on how to fix it!

Functional Testing​

I like to think of this as a White Box approach. Functional testing ensures that everything is set up correctly and doesn’t have any major issues. Of course, it also illustrates any critical and severe vulnerabilities that may have been overlooked.

What’s Next?​

Penetration Testing in the Cloud is an extremely interesting topic once you start to dive into it. Being able to apply penetration techniques to a new service that is continually upgrading keeps ya busy and will have you constantly updating your own thought process and attack techniques.

If cloud penetration testing is something that interests you, I urge you to go set up some accounts with popular cloud providers such as AWS, Azure, and GCP. Also, check out my working copy, Pentesting in the Cloud for Diamonds, for resources on pentesting cloud technology.
 

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Similar threads

Top Bottom