While exploring cloud hacking techniques I dicovered there is a lack of documentation on this subject. The cloud is relativly new and is being adopted by companies all over the world. As a offensive security professional it is important to know how to compromise this new landscape.
This book will cover the methodology and techniques I use when attacking cloud enviorments. Ill go over in technical depth the differnt phases of the cloud hacking life cycle (intial compromise, privilige escalation, lateral movement, discovery, collection, and defense evaision) for each provider (aws,gcp,ect).