KEMBAR78
Hands-On Cloud Security Lab Guide | PDF
0% found this document useful (0 votes)
36 views5 pages

Hands-On Cloud Security Lab Guide

Hands on Lab Security Guide for AWS

Uploaded by

naveen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views5 pages

Hands-On Cloud Security Lab Guide

Hands on Lab Security Guide for AWS

Uploaded by

naveen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

■■ Hands-on Cloud Security Lab Guide

This guide provides step-by-step **attack and defense labs** for demonstrating Cloud Security concepts.
Designed for B.Tech CSE/IT workshops.
Lab 1: S3 Bucket Misconfiguration Attack & Defense
1 Step 1: Create a Public S3 Bucket (Attack Setup) - Log in to AWS Console → S3 → Create bucket
`student-data-lab`. - Disable Block Public Access (insecure). - Upload a sample file `secret.txt`. - Copy
bucket URL and open in browser.

2 Step 2: Attack Demonstration - Run: aws s3 ls s3://student-data-lab --no-sign-request aws s3 cp


s3://student-data-lab/secret.txt .

3 Step 3: Defense (Fix Misconfiguration) - Enable Block Public Access. - Add bucket policy to deny
insecure transport. - Enable Encryption and Access Logging. - Re-test access → Forbidden.
Lab 2: Open Port Attack on EC2 (SSH Brute Force)
1 Step 1: Create Vulnerable EC2 Instance - Launch EC2 instance (Amazon Linux 2). - Security Group:
allow 0.0.0.0/0 for SSH (22). - Share public IP.

2 Step 2: Attack Demonstration - Run from Kali: nmap -p 22 hydra -l ec2-user -P


/usr/share/wordlists/rockyou.txt ssh://

3 Step 3: Defense (Secure VM) - Restrict SSH to trainer’s IP. - Enable MFA and Key-Pair Authentication. -
Install Fail2Ban. - Re-run attack → blocked.
Lab 3: AWS Access Key Leak & Exploitation
1 Step 1: Create Test IAM User - Create IAM user `dev-user` with AmazonS3FullAccess. - Download
Access Key & Secret Key. - Save to keys.txt.

2 Step 2: Simulate Key Leak - Assume keys leaked to GitHub. - Attacker runs: export
AWS_ACCESS_KEY_ID=XXXX export AWS_SECRET_ACCESS_KEY=YYYY aws s3 ls aws s3 cp
s3://student-data-lab/secret.txt .

3 Step 3: Defense (Key Rotation & Detection) - Delete compromised keys. - Enable AWS Config +
GuardDuty. - Use IAM Roles with STS. - Re-run → Access Denied.
■ Workshop Wrap-up
- Each lab demonstrates Attack → Defense cycle. - Each lab takes ~45 mins (3 labs = 4.5 hrs). - End with Q&A; +
Career Path discussion (Cloud Security Engineer, Ethical Hacker).

You might also like