Finding out all the different vulnerabilities to exploit the system with various different methodologies

Attack your own infrastructure

8 AWS services are welcome to perform penetration testing without any prior approvals

  • EC2
  • RDS
  • Aurora
  • Cloudfront
  • API gateways
  • Lambda & Lambda@Edge
  • Lightsail resources
  • Elastic Beanstalk Prohibited
  • DNS Zone walking
  • Dos, DDoS, Simulated DoS, DDoS
  • Port flooding
  • Protocol flooding
  • Request flooding