From the course: Python: Pen Testing AWS
Unlock the full course today
Join today to access over 22,700 courses taught by industry experts or purchase this course individually.
Looking at a weird Python script - Python Tutorial
From the course: Python: Pen Testing AWS
Looking at a weird Python script
- [Instructor] Python is a popular language, and it's not surprising that a number of AWS testing scripts written in Python have been published. A repository of many of the most useful scripts is maintained in the toniblyx GitHub site shown. This groups the scripts into defensive scripts for hardening, assessment, and managing cloud deployment, offensive scripts for testing whether cloud deployments can be penetrated, continuous security auditing scripts for monitoring AWS deployments, and digital forensics and incident response scripts. Let's take a look at the offensive scripts that we can use for testing AWS. The first entry in the list is weirdAAL followed by Pacu. Let's take a look at weirdAAL. We can set up weirdAAL by cloning it, git clone https://github.com/carnal0wnage/weirdAAL.git. And we'll go into weirdAAL, and we'll set up its dependencies, pip3 install -r requirements.txt. Okay, let's check what we've…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
-
(Locked)
Looking at a weird Python script4m 39s
-
(Locked)
The PACU pen testing framework1m 41s
-
(Locked)
Navigating the PACU console3m 40s
-
(Locked)
Exploring PACU test modules1m 52s
-
(Locked)
Account privilege escalation2m 36s
-
(Locked)
Deploying the ec2_ssrf scenario49s
-
(Locked)
Pen testing Lambda with PACU6m 33s
-
(Locked)
Cleaning up your cloud1m 6s
-
(Locked)
-