Vulnerable Cloud Labs

☁️ Vulnerable Cloud Labs & Environments

1. CloudGoat (by Rhino Security Labs)


2. Flaws.Cloud (by Scott Piper)

  • Legendary AWS pentest challenge β€” step-by-step privilege escalation path.

  • Teaches real-world misconfig exploitation like EC2 metadata abuse and S3 leaks.


3. Metasploit for Cloud (via Attack Workbench)

  • Cloud-focused attack chains using familiar tools like Metasploit.

  • Built into newer modules in Metasploit Pro and via community plugins.


4. CloudHound (Active Directory + AWS Hybrid Lab)


5. BadBlood + Cloud Combo

  • Simulate a realistic on-prem Active Directory environment with cloud extensions.

  • Deploy alongside CloudGoat or Azure vulnerable services for hybrid attack testing.


πŸ› οΈ Tools for Cloud Penetration Testing

Tool
Cloud
Purpose

Pacu

AWS

Post-exploitation framework (like Metasploit for AWS)

ScoutSuite

AWS/Azure/GCP

Cloud environment auditing and misconfig detection

CloudSploit

AWS

Security scanning for known misconfigurations

s3scanner / slurp

AWS

Public S3 bucket discovery

CloudBrute

Multi

Subdomain and storage brute-force

GCPBucketBrute

GCP

GCP storage brute-forcing tool

Azucar / MicroBurst

Azure

Azure enumeration, secrets discovery

Enumerate-IAM

AWS

IAM privilege escalation paths

Cloudfox

AWS

Offensive cloud reconnaissance tool

CredMaster

AWS

Tests leaked AWS creds for privilege escalation


πŸ§ͺ Online Platforms for Cloud Security Practice

πŸ”Ή TryHackMe – Cloud Rooms

  • Rooms like:

    • β€œIAM is not enough”

    • β€œHacking the Cloud”

    • β€œCloud Fundamentals”

  • Interactive and beginner-friendly.


πŸ”Ή HackTheBox – Cloud Machines

  • Realistic cloud-based challenges with AWS and Azure setups.

  • Some pro labs simulate hybrid environments.


πŸ”Ή Pentester Academy Cloud Labs (Now INE)

  • Hands-on labs in:

    • AWS privilege escalation

    • SSRF β†’ credential theft

    • Misconfigured S3/EC2/CloudTrail


πŸ”Ή Hacking the Cloud Knowledge Base

  • Comprehensive, attacker-oriented cloud knowledge base with techniques mapped to MITRE ATT&CK.

  • Great for real-world attack chains.


🧱 Cloud Provider-Specific Pentesting Targets

Cloud
Resource

AWS

CloudGoat, flaws.cloud, Pacu

Azure

Azucar, MicroBurst, Azure Goat

GCP

GCPBucketBrute, gcp_enum, InSecurity by BishopFox


🧠 Cloud Pentesting Learning Path

Phase
Focus
Tools & Labs

1

☁️ Enumeration

CloudFox, ScoutSuite

2

πŸ” Identity & Access

Pacu, Enumerate-IAM, MicroBurst

3

πŸ’£ Exploitation

S3 exploitation, metadata abuse, SSRF

4

🧬 Privilege Escalation

IAM abuse, Lambda role takeover

5

πŸ”„ Lateral Movement

STS assume-role, hybrid pivoting

6

🧹 Persistence & Cleanup

Hidden roles, logging bypass, deleting trails

6. IAM Vulnerable (AWS)


7. AWSGoat (by Madhu Akula)


8. AzureGoat


9. GOATStack (Multi-Cloud Lab)


βš™οΈ More Specialized & Underused Tools for Cloud Hacking

Tool
Cloud
Purpose

IAMFinder

AWS

Enumerates trust policies to find privilege chains

Principal Mapper (principal-mapper)

AWS

Maps AWS IAM relationships visually

S3ReverseShell

AWS

Use S3 bucket events to trigger reverse shell via Lambda

AWSBucketDump

AWS

Bruteforce tool for S3 bucket discovery

Cloudlist

Multi

Open-source tool to enumerate cloud assets (great for recon)

Go365

M365

Enumerate and exploit Microsoft 365 misconfigurations

PowerZure

Azure

Privilege escalation and reconnaissance for Azure AD


πŸ“¦ Real-World Cloud Exploit Repositories

Resource
What's Inside

Cloud Security Exploits (by BishopFox)

Active Azure/GCP/AWS attack chains

Red Canary Threat Detection for Cloud

Real telemetry + known bad behavior in cloud

MAD.cloud (MITRE ATT&CK for Cloud)

Mapping of cloud attack techniques to MITRE

NCC Group GitHub

Scripts and case studies for Azure and AWS red teaming

CloudSecList

GitHub list of up-to-date cloud security and pentest resources


🧬 Hybrid & Federated Cloud Attack Vectors

Cloud pentesting isn’t just about one provider. Many enterprises run hybrid environments. Here are cross-cloud attack chains:

Attack Chain
Description

Azure AD β†’ AWS STS AssumeRole

Federated identity configured improperly β€” Azure user can pivot into AWS

GCP IAM β†’ GKE Compromise β†’ Metadata Theft

Abusing service accounts to elevate

Okta SSO Abuse

Exploiting misconfigured identity federation

On-prem AD β†’ ADFS β†’ Cloud Control

Attack Active Directory β†’ Abuse federated login to Azure or AWS

Tools like BloodHound for Azure (AzureHound) and CloudFox are great for mapping these hybrid paths.


πŸ“š Deep-Dive Research, Reports & Guidance

Resource
Why It’s Useful

MITRE ATT&CK: Cloud Matrix

Official attack tactics for cloud systems

NSA Cloud Security Guidance

Defense + attack surface breakdowns

Rhino Security Labs Blog

Deep dives into AWS-specific exploits

Wiz Research

Real-world cloud privilege escalation case studies

Google's Cloud Threat Intelligence Team

New GCP attack simulations and telemetry

Project Aurora (by NCC)

End-to-end cloud security architecture + exploit scenarios


🧭 Advanced Cloud Pentesting Roadmap (Expert-Level)

Stage
Focus
Tools/Resources

πŸ”Ή Recon

Passive discovery, subdomain enum

cloudlist, amass, CloudBrute

πŸ”Ή Initial Access

Misconfig abuse, leaked creds

Pacu, Go365, GH Dorks

πŸ”Ή Enumeration

IAM, buckets, services

ScoutSuite, CloudFox, Azucar

πŸ”Ή Privilege Escalation

Misused policies, chaining roles

Enumerate-IAM, MicroBurst

πŸ”Ή Lateral Movement

Lambda, Function Apps, GKE abuse

Custom scripts, Pacu modules

πŸ”Ή Persistence

Role creation, logging disablement

awscli, azcli, Terraform abuse

πŸ”Ή Data Exfil

Snapshot stealing, S3 dumps

aws s3 cp, GCP gsutil, scripting


πŸ’₯ Want a Fully-Loaded Cloud Pentest Lab Setup?

I can generate a ready-to-go lab setup with:

  • βœ… AWS: CloudGoat + Pacu + custom scripts

  • βœ… Azure: AzureGoat + MicroBurst

  • βœ… GCP: GCPBucketBrute + simulated misconfigs

  • βœ… Hybrid: Federated SSO misconfig with Okta/ADFS

  • βœ… Monitoring: GuardDuty, CloudTrail, or Sentinel for blue team feedback

Last updated

Was this helpful?