AWS

General Knowledge
This section is dedicated to information and techniques that are good to know about when attacking an AWS environment.
Enumeration
Enumeration is the art of learning more about your target. Use these techniques to identify opportunities for further exploitation.
Exploitation
The core of hacking, leverage these techniques to take advantage of the target and gain further access to repeat the process.
Avoid Detection
Avoid being caught in an AWS environment via GuardDuty or CloudTrail. These techniques will help you keep a low profile.
Persistence
These techniques are dedicated to maintaining access in an environment after you've established the initial foothold.