Crawley K. Cloud Penetration Testing for Red Teamers...2023
- Type:
- Other > E-books
- Files:
- 1
- Size:
- 21.67 MiB (22719655 Bytes)
- Uploaded:
- 2024-01-20 13:54 GMT
- By:
- andryold1
- Seeders:
- 41
- Leechers:
- 5
- Info Hash: 11F32EF1F2E9BD771E74E977BB44707F309EF3BC
Textbook in PDF format Key Features • Discover how enterprises use AWS, Azure, and GCP as well as the applications and services unique to each platform • Understand the key principles of successful pentesting and its application to cloud networks, DevOps, and containerized networks (Docker and Kubernetes) • Get acquainted with the penetration testing tools and security measures specific to each platform Book Description With AWS, Azure, and GCP gaining prominence, mastering their unique features, ecosystems, and penetration testing protocols has become an indispensable skill, which is precisely what this pentesting guide for cloud platforms will help you achieve. As you navigate through the chapters, you’ll explore the intricacies of cloud security testing and gain valuable insights into how pentesters and red teamers evaluate cloud environments effectively. In addition to its coverage of these cloud platforms, the book also guides you through modern methodologies for testing containerization technologies such as Docker and Kubernetes, which are fast becoming staples in the cloud ecosystem. Additionally, it places extended focus on penetration testing AWS, Azure, and GCP through serverless applications and specialized tools. These sections will equip you with the tactics and tools necessary to exploit vulnerabilities specific to serverless architecture, thus providing a more rounded skill set. By the end of this cloud security book, you’ll not only have a comprehensive understanding of the standard approaches to cloud penetration testing but will also be proficient in identifying and mitigating vulnerabilities that are unique to cloud environments. What you will learn • Familiarize yourself with the evolution of cloud networks • Navigate and secure complex environments that use more than one cloud service • Conduct vulnerability assessments to identify weak points in cloud configurations • Secure your cloud infrastructure by learning about common cyber attack techniques • Explore various strategies to successfully counter complex cloud attacks • Delve into the most common AWS, Azure, and GCP services and their applications for businesses • Understand the collaboration between red teamers, cloud administrators, and other stakeholders for cloud pentesting Who this book is for This book is for pentesters, aspiring pentesters, and red team members seeking specialized skills for leading cloud platforms — AWS, Azure, and GCP. Those working in defensive security roles will also find this book useful to extend their cloud security skills. Table of Contents 1. How Do Enterprises Utilize and Implement Cloud Networks? 2. How Are Cloud Networks Cyber Attacked? 3. Key Concepts for Pentesting Today’s Cloud Networks 4. Security Features in AWS 5. Pentesting AWS Features through Serverless Applications and Tools 6. Pentesting Containerized Applications in AWS 7. Security Features in Azure 8. Pentesting Azure Features through Serverless Applications and Tools 9. Pentesting Containerized Applications in Azure 10. Security Features in GCP 11. Pentesting GCP Features through Serverless Applications and Tools 12. Pentesting Containerized Applications in GCP 13. Best Practices and Summary