<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Aws on s4yhii&#39;s blog</title>
    <link>https://blog.s4yhii.com/tags/aws/</link>
    <description>Recent content in Aws on s4yhii&#39;s blog</description>
    <image>
      <title>s4yhii&#39;s blog</title>
      <url>https://blog.s4yhii.com/%3Clink%20or%20path%20of%20image%20for%20opengraph,%20twitter-cards%3E</url>
      <link>https://blog.s4yhii.com/%3Clink%20or%20path%20of%20image%20for%20opengraph,%20twitter-cards%3E</link>
    </image>
    <generator>Hugo -- 0.155.3</generator>
    <language>en-us</language>
    <lastBuildDate>Tue, 10 Jan 2023 12:00:00 -0400</lastBuildDate>
    <atom:link href="https://blog.s4yhii.com/tags/aws/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Cloudgoat rce_web_app scenario</title>
      <link>https://blog.s4yhii.com/posts/2023-01-10-aws-cloudgoat-lab/</link>
      <pubDate>Tue, 10 Jan 2023 12:00:00 -0400</pubDate>
      <guid>https://blog.s4yhii.com/posts/2023-01-10-aws-cloudgoat-lab/</guid>
      <description>&lt;h1 id=&#34;cloudgoat-rce_web_app-scenario&#34;&gt;Cloudgoat RCE_WEB_APP Scenario&lt;/h1&gt;
&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;CloudGoat is a training and learning platform developed by Rhino Security Labs to help individuals and organizations understand the risks and vulnerabilities associated with cloud-based applications. One of the scenarios available on CloudGoat is the RCE_web_app scenario, which allows users to practice exploiting remote code execution vulnerabilities in a web application running on the cloud.&lt;/p&gt;
&lt;p&gt;In this blog post, we will walk through the RCE_web_app scenario in CloudGoat and provide a step-by-step guide on how to exploit the vulnerability and gain access to the application&amp;rsquo;s backend. We will also discuss the significance of this vulnerability and how it can be prevented in real-world scenarios. By the end of this post, you should have a better understanding of the risks and challenges associated with web application security in the cloud and how to mitigate them. So, let&amp;rsquo;s get started!&lt;/p&gt;</description>
    </item>
    <item>
      <title>Vulnerability Management with Nessus in AWS</title>
      <link>https://blog.s4yhii.com/posts/2022-01-21-vuln-scan-with-nessus-in-aws/</link>
      <pubDate>Thu, 20 Jan 2022 12:00:00 -0400</pubDate>
      <guid>https://blog.s4yhii.com/posts/2022-01-21-vuln-scan-with-nessus-in-aws/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;In this tutorial we will cover vulnerability scanning and vulnerability remediation. These are two of the main steps in the Vulnerability Management Lifecycle. We will be using Nessus Essentials to scan local VMs hosted on VMWare Workstation in order run credentialed scans to discover vulnerabilities, remediate some of the vulnerabilities.&lt;/p&gt;
&lt;h2 id=&#34;ec2-instance-setup&#34;&gt;EC2 Instance Setup&lt;/h2&gt;
&lt;p&gt;first step is launch an EC2 instance, the recommended requirements are:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;windows OS&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;img alt=&#34;Untitled&#34; loading=&#34;lazy&#34; src=&#34;https://raw.githubusercontent.com/s4yhii/s4yhii.github.io/master/assets/images/htb/Vulnerability%20Management%20with%20Nessus%20in%20AWS%2090286706ffaf46128c3727fb6f6c7e58/Untitled.jpg&#34;&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;basic: t3 medium&lt;/li&gt;
&lt;li&gt;recommended: t3 xlarge&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Decrypt your password to login in a RDP session and use this to access your EC2 instance&lt;/p&gt;</description>
    </item>
    <item>
      <title>AWS Certified Cloud Practicioner Notes</title>
      <link>https://blog.s4yhii.com/posts/2022-01-15-aws-ccp-notes/</link>
      <pubDate>Sun, 16 Jan 2022 12:00:00 -0400</pubDate>
      <guid>https://blog.s4yhii.com/posts/2022-01-15-aws-ccp-notes/</guid>
      <description>&lt;h1 id=&#34;cloud-computing-and-iam&#34;&gt;&lt;strong&gt;Cloud computing and IAM&lt;/strong&gt;&lt;/h1&gt;
&lt;h2 id=&#34;types-of-cloud-computing&#34;&gt;&lt;strong&gt;Types of Cloud Computing&lt;/strong&gt;&lt;/h2&gt;
&lt;h3 id=&#34;infrastructure-as-a-service-iaas&#34;&gt;&lt;strong&gt;Infrastructure as a Service (IaaS)&lt;/strong&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Provide building blocks for cloud IT&lt;/li&gt;
&lt;li&gt;Provide networking, computers, data storage space&lt;/li&gt;
&lt;li&gt;Highest level of flexibility&lt;/li&gt;
&lt;li&gt;Simulate the look from managing physical resources&lt;/li&gt;
&lt;li&gt;Eg: EC2, EBS, GCP, Digital Ocean, Elastic Load Balancing&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;platform-as-a-service-paas&#34;&gt;Platform as a Service (PaaS)&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Remove the company to manage underlying infrastructure&lt;/li&gt;
&lt;li&gt;Focus on deployment and management of applications&lt;/li&gt;
&lt;li&gt;You will define the behavior and environment for your application (code)&lt;/li&gt;
&lt;li&gt;Eg: Heroku, ECS, Elastic Beanstalk&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;software-as-a-service-saas&#34;&gt;&lt;strong&gt;Software as a Service (SaaS)&lt;/strong&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Completed product that is run and managed by the service provider&lt;/li&gt;
&lt;li&gt;offer services meant to be accessed by end users&lt;/li&gt;
&lt;li&gt;Eg: Gmail, Outlook, Recognition for ML, Zoom&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;img alt=&#34;Img1.jpg&#34; loading=&#34;lazy&#34; src=&#34;https://raw.githubusercontent.com/s4yhii/s4yhii.github.io/master/assets/images/AWS-CCP%20Notes%205f15007385e34322932d54765668e379/Img1.jpg&#34;&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Cloud Resume Challenge</title>
      <link>https://blog.s4yhii.com/posts/2022-01-10-aws-cloud-resume-challenge/</link>
      <pubDate>Mon, 10 Jan 2022 12:00:00 -0400</pubDate>
      <guid>https://blog.s4yhii.com/posts/2022-01-10-aws-cloud-resume-challenge/</guid>
      <description>&lt;h1 id=&#34;cloud-resume-challenge&#34;&gt;Cloud Resume Challenge&lt;/h1&gt;
&lt;h2 id=&#34;setup-aws&#34;&gt;Setup AWS&lt;/h2&gt;
&lt;p&gt;Create your aws account&lt;/p&gt;
&lt;p&gt;Setup MFA for your roor account&lt;/p&gt;
&lt;p&gt;Create an IAM user&lt;/p&gt;
&lt;p&gt;Assign permission (Principle of Least privilege)&lt;/p&gt;
&lt;p&gt;Setup Vault (&lt;a href=&#34;https://github.com/99designs/aws-vault&#34;&gt;https://github.com/99designs/aws-vault&lt;/a&gt;)&lt;/p&gt;
&lt;p&gt;aws-vault add myuser ( ex: aws-vault add dev)&lt;/p&gt;
&lt;p&gt;aws-vault exex myuser — aws s3 ls&lt;/p&gt;
&lt;h2 id=&#34;setup-s3&#34;&gt;Setup S3&lt;/h2&gt;
&lt;p&gt;What is s3: file service useful for storing files usually for host a website&lt;/p&gt;
&lt;p&gt;What is AWS SAM: server less application model&lt;/p&gt;
&lt;p&gt;we will create an AWS Lambda (we ignore this for now)&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
