Pentesting and Securing AWS RDS

AWS Relational Database Service (RDSoften hosts the most crucial and sensitive data that is relevant to a specific application. Hence, there is a strong need to focus on identifying exposed AWS RDS instances to enumerate access, and subsequently the data stored in the database instance. This chapter focuses on explaining the process of setting up a sample RDS instance and connecting it to a WordPress instance in both a secure and insecure way. In addition to this, we will focus on gaining access to an exposed database, as well as the identification and exfiltration of sensitive data from this database.

In this chapter, we will cover the following topics:

  • Setting up an RDS instance and connecting it to an EC2 instance
  • Identifying and enumerating exposed RDS instances using Nmap
  • Exploitation and data extraction from a vulnerable RDS instance
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.116.40.53