aws-penetration-testing
Perform AWS Penetration Testing and Security Assessment
Organizations need to validate their AWS cloud security posture against real-world attack techniques. This skill provides authorized security teams with comprehensive methodologies for IAM enumeration, SSRF exploitation testing, S3 bucket assessment, and privilege escalation detection.
Download the skill ZIP
Upload in Claude
Go to Settings → Capabilities → Skills → Upload skill
Toggle on and start using
Test it
Using "aws-penetration-testing". Enumerate current IAM identity and permissions
Expected outcome:
Identity: arn:aws:iam::ACCOUNT:user/test-user
Attached Policies: AmazonS3ReadOnlyAccess, CloudWatchLogsReadOnly
Inline Policies: None
Escalation Risk: LOW - No privilege escalation permissions detected
Using "aws-penetration-testing". Check S3 bucket public access configuration
Expected outcome:
Bucket: company-assets
Public Access Block: Enabled
Bucket Policy: Denies public access
ACL: Bucket-owner-enforced
Status: SECURE - No public access vectors identified
Using "aws-penetration-testing". Test metadata endpoint accessibility
Expected outcome:
IMDS Version: IMDSv2 enabled
Token Required: Yes
Metadata Access: Protected
Status: SECURE - IMDSv2 token requirement prevents SSRF exploitation
Security Audit
High RiskStatic analysis detected 287 patterns across 2 files (881 lines). Most findings are FALSE POSITIVEs because files contain Markdown documentation (not executable code). However, content includes sensitive offensive security techniques (SSRF exploitation, privilege escalation, persistence mechanisms) requiring explicit authorization warnings. Recommend: publish with prominent authorization disclaimers and user acknowledgment requirements.
High Risk Issues (3)
Medium Risk Issues (3)
Low Risk Issues (2)
Risk Factors
⚙️ External commands (3)
🌐 Network access (3)
📁 Filesystem access (2)
🔑 Env variables (1)
Detected Patterns
Quality Score
What You Can Build
Authorized Red Team Engagement
Security consultants performing authorized penetration testing against client AWS environments to identify misconfigurations and privilege escalation paths before malicious actors exploit them.
Cloud Security Audit
Internal security teams assessing their organization's AWS security posture against known attack techniques to validate defensive controls and monitoring capabilities.
Security Research and Training
Security researchers and students learning AWS attack techniques in controlled lab environments (AWSGoat, CloudGoat) to improve defensive security skills.
Try These Prompts
Help me enumerate IAM permissions for the current AWS identity. I have authorized access and need to document what permissions this identity has. Start with sts get-caller-identity and show me how to list attached policies.
I need to assess S3 bucket configurations for public access vulnerabilities. Show me the AWS CLI commands to list buckets, check bucket policies, and identify publicly accessible objects in our authorized test environment.
We're testing our web application for SSRF vulnerabilities that could access AWS metadata endpoints. Document the IMDSv1 and IMDSv2 techniques so we can verify our instance metadata protection controls are working.
Analyze the IAM permissions we've enumerated and identify potential privilege escalation paths. Check for dangerous permissions like iam:CreateAccessKey, iam:AttachUserPolicy, and lambda:UpdateFunctionCode that could lead to admin access.
Best Practices
- Always obtain written authorization documenting scope, systems, and testing window before beginning any penetration testing activities
- Enable CloudTrail logging before testing begins and preserve all logs for post-engagement analysis and client reporting
- Use dedicated test credentials and avoid testing against production environments without explicit change approval and rollback procedures
Avoid
- Never test AWS resources outside the authorized scope - unauthorized access violates computer crime laws even with good intentions
- Do not disable security controls (CloudTrail, GuardDuty, Security Hub) permanently - temporary bypasses must be documented and restored
- Avoid leaving persistent backdoors or access mechanisms after engagement completion - all test artifacts must be removed during cleanup
Frequently Asked Questions
What authorization do I need before using this skill?
Can this skill execute AWS commands automatically?
Is it legal to test AWS services I don't own?
What tools do I need to use this skill effectively?
How do I prevent GuardDuty alerts during testing?
What cleanup is required after testing?
Developer Details
Author
sickn33License
MIT
Repository
https://github.com/sickn33/antigravity-awesome-skills/tree/main/skills/aws-penetration-testingRef
main
File structure