6. Caution..!!!!!!
To perform VAPT on AWS, prior permission is needed from AWS
team
https://aws.amazon.com/forms/penetration-testing-request
7. Testing SSH
1. Direct root access allowed or not
2. Default username password changed or not
3. Login using. pem file or password
4. Environment variables are accessible to the user or not
5. Default port 22 is used or not
6. Try to create a new user with password authentication
13. Whole Audit Process Explained
Auditing with Nessus:
https://www.tenable.com/blog/nessus-amazon-aws-auditing-now-
available
Auditing With Nexpose:
http://www.esecforte.com/auditing-your-cloud-infrastructure-with-
nexpose-enterprise/
17. Using Nimbostratus
Nimbostratus can fingerprint & Exploit AWS Infrastructures
Features:
Dump permissions
Dump instance meta-data
Create new user
More: http://andresriancho.github.io/nimbostratus/
18. Conclusion
Points to Remember while Securing AWS:
Different users for different tasks
Audit users and groups periodically
Security Practices applicable for SSH or service
Security Best Practices:
http://media.amazonwebservices.com/AWS_Security_Best_Practices.pdf
http://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html