From the course: Certified Ethical Hacker (CEH)

Unlock this course with a free trial

Join today to access over 24,800 courses taught by industry experts.

Identifying cloud vs. self-hosted assets

Identifying cloud vs. self-hosted assets

From the course: Certified Ethical Hacker (CEH)

Identifying cloud vs. self-hosted assets

- So in the previous lesson, we talked about how to perform very basic DNS resolution and reconnaissance, and so on. One of the key benefits, of course, doing that is for host enumeration and sub-domain enumeration, and so on. We use Tesla and want to take a moment and explain that they do have a public Bug Bounty Program. As a matter of fact, for the next exercise, I'm using OpenAI and specifically openai.com. But I want to take a moment to explain what I meant about scope and wild cards and so on. So, and then we're going to go into how to enumerate things in the cloud. Whether if a company actually has something, let's say in AWS, in Azure, in Google Cloud platform, and other one. So what you're seeing in front of the screen is one out of many different platforms for bug bounties. It is called bugcrowd. There are many others like HackerOne, Intigriti, Synack, and several other ones. But for this example, I'm going to be using the openai.com domain, but I want to draw your attention…

Contents