From the course: Cybersecurity with Cloud Computing

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Unauthorised access to buckets by anyone

Unauthorised access to buckets by anyone

From the course: Cybersecurity with Cloud Computing

Start my 1-month free trial

Unauthorised access to buckets by anyone

- [Instructor] Scott Piper of Summit Route Consultants has developed a testing site to help us to get hands on with understanding common mistakes in cloud deployments. Let's have a look at the flaws challenge. I'll be using my Kali system for this. If you have a Kali installation, you can follow hands on. The first level of the challenges we're told buckets of fun. Let's start by checking the first hint. This hint indicates we need to use the dig and NS lookup commands to identify the cloud site, but there's an easier way. We can issue a ping command. Kali shows us both the IP address and that the response is from the US west 2 Amazon server. We're told the permissions are a little loose and are provided with another hint. The hint is that we can try browsing the site. Let's go take a look at this through the command line interface. I already have the AWS client installed. So let's go and look at our flaws site. We…

Contents