Features

  • Real attack paths

  • 70% labs + 30% theory

  • Live AWS labs

  • AWS environment exploitation

  • IAM escalation & abuse

  • EC2, Lambda & API compromise

  • S3 & metadata enumeration