Finding out all the different vulnerabilities to exploit the system with various different methodologies
Attack your own infrastructure
8 AWS services are welcome to perform penetration testing without any prior approvals
- EC2
- RDS
- Aurora
- Cloudfront
- API gateways
- Lambda & Lambda@Edge
- Lightsail resources
- Elastic Beanstalk Prohibited
- DNS Zone walking
- Dos, DDoS, Simulated DoS, DDoS
- Port flooding
- Protocol flooding
- Request flooding