Vulnerable Cloud Labs

โ˜๏ธ Vulnerable Cloud Labs & Environments

1. CloudGoat (by Rhino Security Labs)


2. Flaws.Cloud (by Scott Piper)

  • Legendary AWS pentest challenge โ€” step-by-step privilege escalation path.

  • Teaches real-world misconfig exploitation like EC2 metadata abuse and S3 leaks.


3. Metasploit for Cloud (via Attack Workbench)

  • Cloud-focused attack chains using familiar tools like Metasploit.

  • Built into newer modules in Metasploit Pro and via community plugins.


4. CloudHound (Active Directory + AWS Hybrid Lab)


5. BadBlood + Cloud Combo


๐Ÿ› ๏ธ Tools for Cloud Penetration Testing

Tool
Cloud
Purpose

Pacu

AWS

Post-exploitation framework (like Metasploit for AWS)

ScoutSuite

AWS/Azure/GCP

Cloud environment auditing and misconfig detection

CloudSploit

AWS

Security scanning for known misconfigurations

s3scanner / slurp

AWS

Public S3 bucket discovery

CloudBrute

Multi

Subdomain and storage brute-force

GCPBucketBrute

GCP

GCP storage brute-forcing tool

Azucar / MicroBurst

Azure

Azure enumeration, secrets discovery

Enumerate-IAM

AWS

IAM privilege escalation paths

Cloudfox

AWS

Offensive cloud reconnaissance tool

CredMaster

AWS

Tests leaked AWS creds for privilege escalation


๐Ÿงช Online Platforms for Cloud Security Practice

๐Ÿ”น TryHackMe โ€“ Cloud Rooms


๐Ÿ”น HackTheBox โ€“ Cloud Machines


๐Ÿ”น Pentester Academy Cloud Labs (Now INE)


๐Ÿ”น Hacking the Cloud Knowledge Base


๐Ÿงฑ Cloud Provider-Specific Pentesting Targets

Cloud
Resource

AWS

CloudGoat, flaws.cloud, Pacu

Azure

Azucar, MicroBurst, Azure Goat

GCP

GCPBucketBrute, gcp_enum, InSecurity by BishopFox


๐Ÿง  Cloud Pentesting Learning Path

Phase
Focus
Tools & Labs

1

โ˜๏ธ Enumeration

CloudFox, ScoutSuite

2

๐Ÿ” Identity & Access

Pacu, Enumerate-IAM, MicroBurst

3

๐Ÿ’ฃ Exploitation

S3 exploitation, metadata abuse, SSRF

4

๐Ÿงฌ Privilege Escalation

IAM abuse, Lambda role takeover

5

๐Ÿ”„ Lateral Movement

STS assume-role, hybrid pivoting

6

๐Ÿงน Persistence & Cleanup

Hidden roles, logging bypass, deleting trails

6. IAM Vulnerable (AWS)


7. AWSGoat (by Madhu Akula)


8. AzureGoat


9. GOATStack (Multi-Cloud Lab)


โš™๏ธ More Specialized & Underused Tools for Cloud Hacking

Tool
Cloud
Purpose

IAMFinder

AWS

Enumerates trust policies to find privilege chains

Principal Mapper (principal-mapper)

AWS

Maps AWS IAM relationships visually

S3ReverseShell

AWS

Use S3 bucket events to trigger reverse shell via Lambda

AWSBucketDump

AWS

Bruteforce tool for S3 bucket discovery

Cloudlist

Multi

Open-source tool to enumerate cloud assets (great for recon)

Go365

M365

Enumerate and exploit Microsoft 365 misconfigurations

PowerZure

Azure

Privilege escalation and reconnaissance for Azure AD


๐Ÿ“ฆ Real-World Cloud Exploit Repositories

Resource
What's Inside

Cloud Security Exploits (by BishopFox)

Active Azure/GCP/AWS attack chains

Red Canary Threat Detection for Cloud

Real telemetry + known bad behavior in cloud

MAD.cloud (MITRE ATT&CK for Cloud)

Mapping of cloud attack techniques to MITRE

NCC Group GitHub

Scripts and case studies for Azure and AWS red teaming

CloudSecList

GitHub list of up-to-date cloud security and pentest resources


๐Ÿงฌ Hybrid & Federated Cloud Attack Vectors

Cloud pentesting isnโ€™t just about one provider. Many enterprises run hybrid environments. Here are cross-cloud attack chains:

Attack Chain
Description

Azure AD โ†’ AWS STS AssumeRole

Federated identity configured improperly โ€” Azure user can pivot into AWS

GCP IAM โ†’ GKE Compromise โ†’ Metadata Theft

Abusing service accounts to elevate

Okta SSO Abuse

Exploiting misconfigured identity federation

On-prem AD โ†’ ADFS โ†’ Cloud Control

Attack Active Directory โ†’ Abuse federated login to Azure or AWS

Tools like BloodHound for Azure (AzureHound) and CloudFox are great for mapping these hybrid paths.


๐Ÿ“š Deep-Dive Research, Reports & Guidance

Resource
Why Itโ€™s Useful

MITRE ATT&CK: Cloud Matrix

Official attack tactics for cloud systems

NSA Cloud Security Guidance

Defense + attack surface breakdowns

Rhino Security Labs Blog

Deep dives into AWS-specific exploits

Wiz Research

Real-world cloud privilege escalation case studies

Google's Cloud Threat Intelligence Team

New GCP attack simulations and telemetry

Project Aurora (by NCC)

End-to-end cloud security architecture + exploit scenarios


๐Ÿงญ Advanced Cloud Pentesting Roadmap (Expert-Level)

Stage
Focus
Tools/Resources

๐Ÿ”น Recon

Passive discovery, subdomain enum

cloudlist, amass, CloudBrute

๐Ÿ”น Initial Access

Misconfig abuse, leaked creds

Pacu, Go365, GH Dorks

๐Ÿ”น Enumeration

IAM, buckets, services

ScoutSuite, CloudFox, Azucar

๐Ÿ”น Privilege Escalation

Misused policies, chaining roles

Enumerate-IAM, MicroBurst

๐Ÿ”น Lateral Movement

Lambda, Function Apps, GKE abuse

Custom scripts, Pacu modules

๐Ÿ”น Persistence

Role creation, logging disablement

awscli, azcli, Terraform abuse

๐Ÿ”น Data Exfil

Snapshot stealing, S3 dumps

aws s3 cp, GCP gsutil, scripting


๐Ÿ’ฅ Want a Fully-Loaded Cloud Pentest Lab Setup?

I can generate a ready-to-go lab setup with:

  • โœ… AWS: CloudGoat + Pacu + custom scripts

  • โœ… Azure: AzureGoat + MicroBurst

  • โœ… GCP: GCPBucketBrute + simulated misconfigs

  • โœ… Hybrid: Federated SSO misconfig with Okta/ADFS

  • โœ… Monitoring: GuardDuty, CloudTrail, or Sentinel for blue team feedback

Last updated