Many of the systems a PenTest-er targets rely on web applications and cloud resources to perform their functions. Because of this, web applications and cloud resources are often prime targets for gaining access to a system. The PenTest-er needs to be familiar with the different types of attacks that can be used against these environments.

<aside> <img src="/icons/target_red.svg" alt="/icons/target_red.svg" width="40px" />

Mission Objectives


1. Web-Based Attacks

Modern applications are complex, often involving a front-end, an API, and a database. We look for breaks in the communication between these layers.

2. Cloud-Based Attacks

Attacking "the cloud" isn't about attacking the provider (Amazon/Microsoft); it’s about attacking the user's misconfigurations.