โ๏ธ Vulnerable Cloud Labs & Environments
1. CloudGoat (by Rhino Security Labs)
Purpose-built vulnerable AWS environment.
Deploys via Terraform in your AWS account.
2. Flaws.Cloud (by Scott Piper)
Legendary AWS pentest challenge โ step-by-step privilege escalation path.
Teaches real-world misconfig exploitation like EC2 metadata abuse and S3 leaks.
Cloud-focused attack chains using familiar tools like Metasploit.
Built into newer modules in Metasploit Pro and via community plugins.
4. CloudHound (Active Directory + AWS Hybrid Lab)
Designed for hybrid cloud environments:
AWS + on-prem AD + IAM abuse
5. BadBlood + Cloud Combo
Simulate a realistic on-prem Active Directory environment with cloud extensions.
Deploy alongside CloudGoat or Azure vulnerable services for hybrid attack testing.
Post-exploitation framework (like Metasploit for AWS)
Cloud environment auditing and misconfig detection
Security scanning for known misconfigurations
Public S3 bucket discovery
Subdomain and storage brute-force
GCP storage brute-forcing tool
Azure enumeration, secrets discovery
IAM privilege escalation paths
Offensive cloud reconnaissance tool
Tests leaked AWS creds for privilege escalation
๐น TryHackMe โ Cloud Rooms
Interactive and beginner-friendly.
๐น HackTheBox โ Cloud Machines
Realistic cloud-based challenges with AWS and Azure setups.
Some pro labs simulate hybrid environments.
๐น Pentester Academy Cloud Labs (Now INE)
Hands-on labs in:
SSRF โ credential theft
Misconfigured S3/EC2/CloudTrail
๐น Hacking the Cloud Knowledge Base
Comprehensive, attacker-oriented cloud knowledge base with techniques mapped to MITRE ATT&CK.
Great for real-world attack chains.
๐งฑ Cloud Provider-Specific Pentesting Targets
CloudGoat, flaws.cloud, Pacu
Azucar, MicroBurst, Azure Goat
GCPBucketBrute, gcp_enum, InSecurity by BishopFox
๐ง Cloud Pentesting Learning Path
Pacu, Enumerate-IAM, MicroBurst
S3 exploitation, metadata abuse, SSRF
๐งฌ Privilege Escalation
IAM abuse, Lambda role takeover
STS assume-role, hybrid pivoting
๐งน Persistence & Cleanup
Hidden roles, logging bypass, deleting trails
6. IAM Vulnerable (AWS)
What it is: A focused lab on exploiting IAM misconfigurations in AWS.
7. AWSGoat (by Madhu Akula)
A multi-scenario vulnerable AWS deployment to simulate real-world insecure cloud setups.
Use for:
Pentesting EC2, Lambda, IAM, CloudFormation
Azureโs version of AWSGoat.
Deploy intentionally vulnerable Azure services:
9. GOATStack (Multi-Cloud Lab)
Great for enterprise-level hybrid environment testing.
Enumerates trust policies to find privilege chains
Principal Mapper (principal-mapper)
Maps AWS IAM relationships visually
Use S3 bucket events to trigger reverse shell via Lambda
Bruteforce tool for S3 bucket discovery
Open-source tool to enumerate cloud assets (great for recon)
Enumerate and exploit Microsoft 365 misconfigurations
Privilege escalation and reconnaissance for Azure AD
๐ฆ Real-World Cloud Exploit Repositories
Cloud Security Exploits (by BishopFox)
Active Azure/GCP/AWS attack chains
Red Canary Threat Detection for Cloud
Real telemetry + known bad behavior in cloud
MAD.cloud (MITRE ATT&CK for Cloud)
Mapping of cloud attack techniques to MITRE
Scripts and case studies for Azure and AWS red teaming
GitHub list of up-to-date cloud security and pentest resources
๐งฌ Hybrid & Federated Cloud Attack Vectors
Cloud pentesting isnโt just about one provider. Many enterprises run hybrid environments. Here are cross-cloud attack chains:
Azure AD โ AWS STS AssumeRole
Federated identity configured improperly โ Azure user can pivot into AWS
GCP IAM โ GKE Compromise โ Metadata Theft
Abusing service accounts to elevate
Exploiting misconfigured identity federation
On-prem AD โ ADFS โ Cloud Control
Attack Active Directory โ Abuse federated login to Azure or AWS
Tools like BloodHound for Azure (AzureHound) and CloudFox are great for mapping these hybrid paths.
๐ Deep-Dive Research, Reports & Guidance
Resource
Why Itโs Useful
MITRE ATT&CK: Cloud Matrix
Official attack tactics for cloud systems
NSA Cloud Security Guidance
Defense + attack surface breakdowns
Deep dives into AWS-specific exploits
Real-world cloud privilege escalation case studies
Google's Cloud Threat Intelligence Team
New GCP attack simulations and telemetry
End-to-end cloud security architecture + exploit scenarios
๐งญ Advanced Cloud Pentesting Roadmap (Expert-Level)
Stage
Focus
Tools/Resources
Passive discovery, subdomain enum
cloudlist, amass, CloudBrute
Misconfig abuse, leaked creds
ScoutSuite, CloudFox, Azucar
๐น Privilege Escalation
Misused policies, chaining roles
Enumerate-IAM, MicroBurst
Lambda, Function Apps, GKE abuse
Custom scripts, Pacu modules
Role creation, logging disablement
awscli, azcli, Terraform abuse
Snapshot stealing, S3 dumps
aws s3 cp, GCP gsutil, scripting
๐ฅ Want a Fully-Loaded Cloud Pentest Lab Setup?
I can generate a ready-to-go lab setup with:
โ
AWS: CloudGoat + Pacu + custom scripts
โ
Azure: AzureGoat + MicroBurst
โ
GCP: GCPBucketBrute + simulated misconfigs
โ
Hybrid: Federated SSO misconfig with Okta/ADFS
โ
Monitoring: GuardDuty, CloudTrail, or Sentinel for blue team feedback
Last updated