OAWSPIntermediateAWS

Breaching AWS

Lab-first training on offensive AWS security. Cover IAM enumeration, SSRF to the metadata service, S3 bucket abuse, AssumeRole pivoting, Lambda exploitation, and persistence across AWS accounts.

18 hands-on labs
OAWSPOAWSP certification
1 exam attempt
14 video lessons
14 services abused
Discord community
Breaching AWS
OAWSP
OAWSP

Offensive AWS Security Professional

Labs18
Modules18
Exam attempts1
Course Material AccessLifetime
CommunityDiscord
Enroll Now← Back to all courses

What you'll be able to do

Enumerate AWS IAM configurations to identify attack paths

Exploit SSRF vulnerabilities to steal IAM credentials from the metadata service

Abuse S3 bucket misconfigurations for data exfiltration

Pivot across AWS accounts using misconfigured AssumeRole policies

Compromise Lambda functions to extract secrets and escalate privileges

Chain vulnerabilities into complete AWS account takeovers

Write professional attack path reports for OAWSP certification

Attack techniques covered

Each technique is taught through a dedicated lab with a real target environment, not a walkthrough video.

Map IAM users, roles, groups, and policies without authenticated API errors.

Course structure

18 modules · 25 topics · 14 video lessons · 1 certification exam

01Introduction
2 topics

Course overview, AWS attack methodology, and lab environment setup including tooling and access configuration.

02Rules of Engagement
1 topic

Ethical and legal guidelines for the course labs, scope boundaries, and responsible disclosure expectations.

03BAWS 01 – Enumerating S3 Buckets
Sample2 topics

Discover and access publicly exposed S3 buckets to enumerate objects, extract sensitive data, and map storage attack surface.

04BAWS 02 – AWS Subdomain Takeover
1 topic

Claim dangling DNS records pointing to deprovisioned AWS services such as Elastic Beanstalk and S3 to intercept traffic.

05BAWS 02 – Dumping EBS Secrets
Sample3 topics

Extract secrets and sensitive data from exposed or misconfigured EBS snapshots by mounting them in a controlled environment.

06BAWS 03 – Enumeration & Command Execution via SSM
3 topics

Abuse AWS Systems Manager Session Manager to enumerate EC2 instances and execute commands without SSH or open inbound ports.

07BAWS 04 – Abuse IAM User Roles, Instance Metadata & SNS
3 topics

Exploit over-privileged IAM roles and the EC2 Instance Metadata Service (IMDS) to assume roles and abuse SNS for privilege escalation.

08BAWS 05 – Capture Credentials from SNS Service
2 topics

Intercept and capture AWS credentials transmitted through misconfigured SNS topic subscriptions and HTTP endpoints.

09BAWS 06 – Get Remote Code Execution on a Lambda Function
2 topics

Exploit a vulnerable Lambda function to achieve remote code execution and extract environment variables containing secrets.

10BAWS 07 – Enumerate and Read Data from DynamoDB
2 topics

Enumerate accessible DynamoDB tables and exfiltrate records using compromised IAM credentials.

11BAWS 08 – Upload Malicious Image into ECR
2 topics

Push a backdoored container image to Elastic Container Registry and trigger its deployment to gain code execution inside ECS or EKS workloads.

12BAWS 09 – AWS SSO Phishing Attack
2 topics

Execute phishing attacks targeting AWS IAM Identity Center (SSO) to harvest session tokens and gain access to multiple AWS accounts.

13BAWS 10 – Enumerate AWS IAM Identity Center Permissions
2 topics

Map permission sets and account assignments across AWS organizations using IAM Identity Center to identify privilege escalation paths.

14BAWS 11 – Enumerate IAM & Retrieve Secrets
2 topics

Enumerate IAM users, roles, and policies, then extract secrets from AWS Secrets Manager and Systems Manager Parameter Store.

15BAWS 12 – Utilising Rancher for Pod Access
3 topics

Abuse a misconfigured Rancher instance to gain direct access to Kubernetes pods and escalate privileges within the cluster.

16BAWS 13 – Enumerate RDS and Retrieve Final Flag
2 topics

Enumerate RDS database instances, obtain connection credentials, connect to the database, and retrieve the final lab flag.

OAWSP

Offensive AWS Security Professional (OAWSP)

The OAWSP exam requires you to compromise a live cloud environment and submit a professional attack path report. There is no multiple-choice component.

Exam format

Report submission

Attempts included

1

Validity

Lifetime

Pricing

Choose your plan

All plans include lifetime access to course material and a certification exam attempt.

Limited offerUse code CB25OFF for 25% off — applied automatically at checkout

Breaching AWS

Essential

$599

$449

  • 30 Days Cloud Labs Access
  • Lifetime Access to Course Material
  • Digital Content
  • 1x OAWSP Exam Attempt
  • Certificate of Completion
  • PDF Training Guide
  • 2x OAWSP Exam Attempts
  • Video Lessons
  • Priority Support

Breaching AWS

Extended

$799

$599

  • 60 Days Cloud Labs Access
  • Lifetime Access to Course Material
  • Digital Content
  • 1x OAWSP Exam Attempt
  • Certificate of Completion
  • PDF Training Guide
  • 2x OAWSP Exam Attempts
  • Video Lessons
  • Priority Support
Most Complete

Breaching AWS+

$1,000

$750

  • 60 Days Cloud Labs Access
  • Lifetime Access to Course Material
  • Digital Content
  • PDF Training Guide
  • 2x OAWSP Exam Attempts
  • Video Lessons
  • Priority Support
  • Certificate of Completion

Teams & Enterprise

All Plus features · Dynamic group discount · Custom onboarding

Contact us →

FAQ

Frequently asked questions

The exam is practical and based on the course material. You are given access to a live AWS environment for 24 hours with the goal of compromising the target and capturing the final flag. You then have 24 hours to submit a report. Passing earns your OAWSP digital badge.

No. The OAWSP exam requires purchasing the course. If you fail your first attempt, you can purchase an exam voucher to try again.

No. You only need a standard web browser. The training environments are fully hosted on cloud infrastructure and remote access is provided through the browser.

Yes. You can purchase the course today and schedule your lab start date for whenever works best for you.

Pausing is not currently possible. The lab is deployed on your scheduled start date and runs for 30 or 60 days depending on your plan.

Yes. Lab access can be extended at any time through the CloudBreach portal at cloudbreach.io/addons.

We do not offer refunds for digital training courses. Please review the course description and objectives before purchasing.

Join Discord

Active community of students, certified practitioners, and course authors. Get unstuck, share techniques, and discuss findings without spoilers.

Join Discord
Certification badge

Earn your OAWSP.

Complete Breaching AWS and prove your offensive cloud security skills with a report-based certification exam.