Learn the Ins & Outs, Infrastructure & Vulnerabilities of Amazon’s AWS Cloud Computing Platform

While we haven't covered Amazon Web Services, or AWS, on Null Byte before, Amazon's cloud computing platform is ripe for attack by hackers, pentesters, and cybersecurity researchers. It's also an excellent cloud hosting service to build or use vulnerable-by-design AWS setups and frameworks. AWS buckets are a particularly vulnerable attribute to Amazon's cloud service, which store files and allow employees and other users to share them. Internet-facing services also use these buckets to store sensitive information, such as server backups or backend scripts. These buckets can be private or... more