{"id":9262,"date":"2021-03-04T13:44:21","date_gmt":"2021-03-04T08:14:21","guid":{"rendered":"https:\/\/www.varutra.com\/?p=9262"},"modified":"2023-03-24T14:25:02","modified_gmt":"2023-03-24T08:55:02","slug":"aws-pentesting-part-1","status":"publish","type":"post","link":"https:\/\/www.varutra.com\/varutravrt3\/aws-pentesting-part-1\/","title":{"rendered":"AWS Pentesting &#8211; Part &#8211; 1"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"1080\" src=\"https:\/\/varutra-1a3b6.kxcdn.com\/wp-content\/uploads\/2021\/03\/AWS-Pentesting-1-1024x573.png\"  class=\"sh-overlay-item sh-table-cell ls-is-cached lazyloaded\" data-rel=\"lightcase\" title=\"AWS Pentesting - Varutra Consulting\"><br \/>\nNowadays, we have experienced many data breaches exposing different vulnerabilities like s3 buckets, compromised AWS cloud environments, and many more so avoid this it is important to perform AWS Pentesting.<\/p>\n<p>&nbsp;<\/p>\n<p>To understand the attacks on AWS, one must be aware of the different services provided by AWS.<\/p>\n<p>In this blog, we will understand the different services provided by AWS, data breaches on AWS cloud services, tools used for Pentesting the AWS services, and how to start with the AWS CLI.<\/p>\n<p><strong> <img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-9266 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/03\/AWS-Pentesting.png\" alt=\"AWS Pentesting\" width=\"379\" height=\"203\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/03\/AWS-Pentesting.png 379w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/03\/AWS-Pentesting-300x161.png 300w\" sizes=\"(max-width: 379px) 100vw, 379px\" \/><\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>AWS offers many services. Like EC2, S3, AWS Lambda, CloudTrail, CloudWatch, and many more\u2026.<\/p>\n<p>Many of the data breaches happen because of the misconfiguration of AWS services.<\/p>\n<p>In this series of blog posts, we will discuss how these services can be exploited if it is not configured properly and countermeasures of course.<\/p>\n<p>&nbsp;<\/p>\n<h3 style=\"text-align: left\"><strong><u>Let\u2019s have a look at S3 Bucket Basic Services.<\/u><\/strong><\/h3>\n<p><strong>\u00a0<\/strong><\/p>\n<ul>\n<li><strong>S3<\/strong><\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-9273 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/03\/S3-Bucket.png\" alt=\"S3 Bucket\" width=\"151\" height=\"133\" \/><\/p>\n<p>Source: <a href=\"https:\/\/blog.lawrencemcdaniel.com\/integrating-aws-s3-cloudfront-with-wordpress-2\/\">https:\/\/blog.lawrencemcdaniel.com\/integrating-aws-s3-cloudfront-with-wordpress-2\/<\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Now the question is what is S3?<\/strong><\/h3>\n<p>S3 stands for Simple Storage Service<\/p>\n<ul>\n<li>Highly scalable storage services with virtually unlimited capacity.<\/li>\n<li>The main element of the service is a bucket which acts as a container. Contents which are stored in the bucket are called objects like file, backup, documents, images, sensitive file, source code, static web site, etc.<\/li>\n<li>Using amazon s3, you can store and retrieve any amount of data at any time on the web.<\/li>\n<li>A different mechanism of access control for s3 buckets\n<ul>\n<li>ACLs<\/li>\n<li>Bucket policies<\/li>\n<li>IAM policies<\/li>\n<\/ul>\n<\/li>\n<li>S3 buckets can be accessed via HTTP interface and AWS CLI\n<ul>\n<li>http:\/\/s3.amazonaws.com\/bucket_name<\/li>\n<li><a href=\"http:\/\/bucket_name.s3.amazonaws.com\">http:\/\/bucket_name.s3.amazonaws.com<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>Refer to the link to understand S3 in detail. <a href=\"https:\/\/aws.amazon.com\/s3\/\">https:\/\/aws.amazon.com\/s3\/<\/a><\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li><strong>EC2<\/strong><\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-9275 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/03\/Amazon-EC2.png\" alt=\"Amazon EC2\" width=\"181\" height=\"163\" \/><\/p>\n<p>Source: <a href=\"https:\/\/medium.com\/awesome-cloud\/aws-amazon-ec2-instance-purchasing-options-d57f9b20dfa7\">https:\/\/medium.com\/awesome-cloud\/aws-amazon-ec2-instance-purchasing-options-d57f9b20dfa7<\/a><\/p>\n<ul>\n<li>EC2 is nothing but Elastic Cloud Compute<\/li>\n<li>Most widely used service that provides a secure and resizable compute capacity in the cloud<\/li>\n<li>It can be used to launch as many virtual servers you need on a pay-as-you-go basis.<\/li>\n<\/ul>\n<p>Refer to this link to understand EC2 in detail <a href=\"https:\/\/aws.amazon.com\/ec2\/\">https:\/\/aws.amazon.com\/ec2\/<\/a><\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li><strong>IAM<\/strong><\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-9269 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/03\/AWS-IAM.png\" alt=\"AWS IAM\" width=\"125\" height=\"136\" \/><\/p>\n<p>Source: <a href=\"https:\/\/medium.com\/@niharmishra511\/aws-iam-7b48e997ecb9\">https:\/\/medium.com\/@niharmishra511\/aws-iam-7b48e997ecb9<\/a><\/p>\n<ul>\n<li>To control privileges<\/li>\n<li>Is a web service used in combination with all Amazon Services?<\/li>\n<\/ul>\n<p>Refer to this link to understand IAM in detail. <a href=\"https:\/\/aws.amazon.com\/iam\/\">https:\/\/aws.amazon.com\/iam\/<\/a><\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li><strong>AWS Lambda<\/strong><\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-9270 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/03\/AWS-Lambda.png\" alt=\"AWS Lambda\" width=\"155\" height=\"103\" \/><\/p>\n<p>Source: <a href=\"https:\/\/blog.iron.io\/aws-lambda-reviews\/\">https:\/\/blog.iron.io\/aws-lambda-reviews\/<\/a><\/p>\n<ul>\n<li>FaaS(Function as a Service)<\/li>\n<li>Offers serverless functions and applications.<\/li>\n<li>Code runs in response to events<\/li>\n<\/ul>\n<p>Refer to this link to understand AWS Lambda in detail. <a href=\"https:\/\/aws.amazon.com\/lambda\/\">https:\/\/aws.amazon.com\/lambda\/<\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Now the question is why there is a need for pentesting?<\/strong><\/h3>\n<p>As more and more organizations moving towards the cloud, a data breach is increasing day by day, and to protect this data breach Pentesting requirement has become necessary. Let us discuss about the data breach on the cloud in brief.<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center\"><strong><u>A data breach on Cloud<\/u><\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-9272 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/03\/Data-Breach-on-Cloud.png\" alt=\"Data Breach on Cloud\" width=\"475\" height=\"360\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/03\/Data-Breach-on-Cloud.png 475w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/03\/Data-Breach-on-Cloud-300x227.png 300w\" sizes=\"(max-width: 475px) 100vw, 475px\" \/><\/p>\n<p>According to Gartner, Gartner analyst Neil MacDonald says that 99 percent of <a href=\"https:\/\/www.varutra.com\/cloud-security\/\">cloud security<\/a> failures will be the customer\u2019s fault through 2025.<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li><strong>Capital One<\/strong><\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-9271 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/03\/Capital-One.png\" alt=\"Capital One\" width=\"126\" height=\"63\" \/><\/p>\n<ul>\n<li>Year: 2019<\/li>\n<li>Attacker: AWS Employee<\/li>\n<li>Data leaked: 80,000 bank account numbers leaked<\/li>\n<li>How: SSRF<\/li>\n<li>Cause: misconfiguration of IAM role permissions for EC2 instance<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li><strong>Accenture<\/strong><\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-9274 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/03\/Accenture.png\" alt=\"Accenture\" width=\"122\" height=\"60\" \/><\/p>\n<ul>\n<li>Year: 2017<\/li>\n<li>Attacker: Unsecured amazon s3 buckets was discovered by one of the UpGuard Security Researcher<\/li>\n<li>Data leaked: SecretAPI data, authentication credentials, decryption keys, and customer data<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>There are many data breaches that happened in the past like the GoDaddy data breach due to s3 cloud bucket misconfiguration, Verizon due to S3 leak, AgentRun leaks customer health information, and many more.<\/p>\n<p>&nbsp;<\/p>\n<p>These data breaches can be minimized by performing pen-testing, <a href=\"https:\/\/www.varutra.com\/audit-compliance\/\">security audits<\/a> on different AWS cloud services.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Now the question is what are the tools required to start for pentesting AWS cloud?<\/strong><\/h3>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center\"><strong><u>Tools<\/u><\/strong><\/p>\n<p><strong><u><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-9276 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/03\/Tools.png\" alt=\"Tools\" width=\"100\" height=\"100\" \/><\/u><\/strong><\/p>\n<ul>\n<li><strong>AWS-inventory<\/strong><\/li>\n<\/ul>\n<p><strong>\u00a0<\/strong>Python script to discover all AWS resources created in an account.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-9277 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/03\/aws-inventory.png\" alt=\"aws-inventory\" width=\"509\" height=\"310\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/03\/aws-inventory.png 509w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/03\/aws-inventory-300x183.png 300w\" sizes=\"(max-width: 509px) 100vw, 509px\" \/><\/p>\n<p>Source:<a href=\"https:\/\/github.com\/nccgroup\/aws-inventory\">https:\/\/github.com\/nccgroup\/aws-inventory<\/a><\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li><strong>Pmapper<\/strong><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>Principal Mapper (PMapper) is a script and library for identifying risks in the configuration of AWS <a href=\"https:\/\/www.varutra.com\/guide-to-identity-access-management-iam\/\">Identity and Access Management (IAM)<\/a> in an AWS account.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-9279 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/03\/PMapper.png\" alt=\"PMapper\" width=\"436\" height=\"407\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/03\/PMapper.png 436w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/03\/PMapper-300x280.png 300w\" sizes=\"(max-width: 436px) 100vw, 436px\" \/><\/p>\n<p>\u00ad\u00ad\u00ad\u00ad\u00adSource: <a href=\"https:\/\/github.com\/nccgroup\/PMapper\">https:\/\/github.com\/nccgroup\/PMapper<\/a><\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li><strong>Bucket_finder<\/strong><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>Ruby script to perform brute force attack on s3 bucket<\/p>\n<p>&nbsp;<\/p>\n<p>Source: <a href=\"https:\/\/github.com\/FishermansEnemy\/bucket_finder\">https:\/\/github.com\/FishermansEnemy\/bucket_finder<\/a><\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li><strong>Prowler<\/strong><\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-9280 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/03\/Prawler.png\" alt=\"Prawler\" width=\"606\" height=\"354\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/03\/Prawler.png 606w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/03\/Prawler-300x175.png 300w\" sizes=\"(max-width: 606px) 100vw, 606px\" \/><\/p>\n<p>Prawler is a CLI tool for AWS Security Best Practices, auditing, hardening as per CIS AMAZON Web Services Foundations Benchmark.<\/p>\n<p>Source: <a href=\"https:\/\/github.com\/toniblyx\/prowler\">https:\/\/github.com\/toniblyx\/prowler<\/a><\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li><strong>Nimbostratus<\/strong><\/li>\n<\/ul>\n<p>Tools for fingerprinting and exploiting Amazon cloud infrastructures.<\/p>\n<p>Source: <a href=\"https:\/\/github.com\/andresriancho\/nimbostratus\">https:\/\/github.com\/andresriancho\/nimbostratus<\/a><\/p>\n<p>Find out the link for more tools\u00e0<a href=\"https:\/\/github.com\/toniblyx\/my-arsenal-of-aws-security-tools\">https:\/\/github.com\/toniblyx\/my-arsenal-of-aws-security-tools<\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><strong><u>Now it\u2019s time to set up AWS CLI in kali linux.<\/u><\/strong><\/h3>\n<p><strong>Steps:<\/strong><\/p>\n<ol>\n<li>Go to the link <a href=\"https:\/\/docs.aws.amazon.com\/cli\/latest\/userguide\/install-cliv2-linux.html\">https:\/\/docs.aws.amazon.com\/cli\/latest\/userguide\/install-cliv2-linux.html<\/a> in the browser. Click on the link as shown in the below image.<img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-9281 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/03\/Go-to-the-link.png\" alt=\"Go to the link\" width=\"606\" height=\"276\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/03\/Go-to-the-link.png 606w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/03\/Go-to-the-link-300x137.png 300w\" sizes=\"(max-width: 606px) 100vw, 606px\" \/><\/li>\n<li>Save the zip file to a location in your system and rename the folder to awscliv2.zip <img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-9282 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/03\/Save-the-zip-file.png\" alt=\"Save the zip file\" width=\"606\" height=\"312\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/03\/Save-the-zip-file.png 606w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/03\/Save-the-zip-file-300x154.png 300w\" sizes=\"(max-width: 606px) 100vw, 606px\" \/><\/li>\n<li>Unzip the AWS cli<img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-9285 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/03\/Unzip-the-aws-cli.png\" alt=\"Unzip the aws cli\" width=\"345\" height=\"65\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/03\/Unzip-the-aws-cli.png 345w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/03\/Unzip-the-aws-cli-300x57.png 300w\" sizes=\"(max-width: 345px) 100vw, 345px\" \/><\/li>\n<li>Install the AWS cli <img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-9284 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/03\/Install-the-aws-cli.png\" alt=\"Install the aws cli\" width=\"382\" height=\"82\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/03\/Install-the-aws-cli.png 382w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/03\/Install-the-aws-cli-300x64.png 300w\" sizes=\"(max-width: 382px) 100vw, 382px\" \/><\/li>\n<li>Verify AWS cli is installed or not by using a command\u00a0 AWS \u2013version<img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-9283 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/03\/Verify-aws-cli-is-installed-or-not-by-using-command.png\" alt=\"Verify aws cli is installed or not by using command\" width=\"606\" height=\"100\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/03\/Verify-aws-cli-is-installed-or-not-by-using-command.png 606w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/03\/Verify-aws-cli-is-installed-or-not-by-using-command-300x50.png 300w\" sizes=\"(max-width: 606px) 100vw, 606px\" \/><\/li>\n<li>The next step is to configure your AWS account.<\/li>\n<\/ol>\n<p>Enter access keys and secret keys of your AWS account with AWS CLI.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-9286 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/03\/Next-step-is-to-configure-your-AWS-account.png\" alt=\"Next step is to configure your AWS account\" width=\"609\" height=\"106\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/03\/Next-step-is-to-configure-your-AWS-account.png 609w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/03\/Next-step-is-to-configure-your-AWS-account-300x52.png 300w\" sizes=\"(max-width: 609px) 100vw, 609px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>That\u2019s it for now. In the next blog, we will learn about the s3 bucket exploitation part.<\/p>\n<p style=\"text-align: center\"><strong>Till then bye-bye!<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Reference:<\/strong><\/h3>\n<p><a href=\"https:\/\/blog.eccouncil.org\/all-you-need-to-know-about-pentesting-in-the-aws-cloud\/\">https:\/\/blog.eccouncil.org\/all-you-need-to-know-about-pentesting-in-the-aws-cloud\/<\/a><\/p>\n<p>https:\/\/www.lacework.com\/top-cloud-breaches-2019\/<\/p>\n<p><a href=\"https:\/\/securityaffairs.co\/wordpress\/64150\/data-breach\/accenture-data-leak.html\">https:\/\/securityaffairs.co\/wordpress\/64150\/data-breach\/accenture-data-leak.html<\/a><\/p>\n<p><a href=\"https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2018\/08\/09\/the-one-cloud-security-metric-every-ciso-should-know\/?sh=4a2b44ae5375\">https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2018\/08\/09\/the-one-cloud-security-metric-every-ciso-should-know\/?sh=4a2b44ae5375<\/a><\/p>\n<p><a href=\"https:\/\/www.cio.com\/article\/3529426\/posture-management-cloud-security-tools-rise-in-wake-of-breaches.html\">https:\/\/www.cio.com\/article\/3529426\/posture-management-cloud-security-tools-rise-in-wake-of-breaches.html<\/a><\/p>\n<p><a href=\"https:\/\/www.slideshare.net\/ObikaGellineau\/capital-one-data-breach\">https:\/\/www.slideshare.net\/ObikaGellineau\/capital-one-data-breach<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>Author,<\/p>\n<p><strong>Bhamini Shah<\/strong><\/p>\n<p>Attack &amp; Pentest Team<\/p>\n<p>Varutra Consulting Pvt. Ltd.<\/p>","protected":false},"excerpt":{"rendered":"<p>Nowadays, we have experienced many data breaches exposing different vulnerabilities like s3 buckets, compromised AWS cloud environments, and many more so avoid this it is&#8230;<\/p>\n","protected":false},"author":4,"featured_media":9291,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[269,270,121],"tags":[353,357,354,355,356],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.6.3 - aioseo.com -->\n\t\t<meta name=\"description\" content=\"Understand the different services provided by AWS, data breaches on AWS cloud services, tools used for AWS Pentesting, and how to start with the AWS CLI.\" \/>\n\t\t<meta name=\"robots\" content=\"max-image-preview:large\" \/>\n\t\t<link rel=\"canonical\" href=\"https:\/\/www.varutra.com\/varutravrt3\/aws-pentesting-part-1\/\" \/>\n\t\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.6.3\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Varutra Consulting\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"AWS Pentesting to Avoid Data Breaches on AWS Cloud Services\" \/>\n\t\t<meta property=\"og:description\" content=\"Understand the different services provided by AWS, data breaches on AWS cloud services, tools used for AWS Pentesting, and how to start with the AWS CLI.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.varutra.com\/varutravrt3\/aws-pentesting-part-1\/\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/03\/AWS-Pentesting-1.png\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/03\/AWS-Pentesting-1.png\" \/>\n\t\t<meta property=\"og:image:width\" content=\"1060\" \/>\n\t\t<meta property=\"og:image:height\" content=\"593\" \/>\n\t\t<meta property=\"article:section\" content=\"Data Breaches\" \/>\n\t\t<meta property=\"article:tag\" content=\"aws\" \/>\n\t\t<meta property=\"article:tag\" content=\"cloud security\" \/>\n\t\t<meta property=\"article:tag\" content=\"data breaches\" \/>\n\t\t<meta property=\"article:tag\" content=\"pentesting\" \/>\n\t\t<meta property=\"article:tag\" content=\"vapt\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2021-03-04T08:14:21+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2023-03-24T08:55:02+00:00\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:title\" content=\"AWS Pentesting to Avoid Data Breaches on AWS Cloud Services\" \/>\n\t\t<meta name=\"twitter:description\" content=\"Understand the different services provided by AWS, data breaches on AWS cloud services, tools used for AWS Pentesting, and how to start with the AWS CLI.\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/03\/AWS-Pentesting-1.png\" \/>\n\t\t<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t\t<meta name=\"twitter:data1\" content=\"kalpblogger\" \/>\n\t\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/aws-pentesting-part-1\\\/#article\",\"name\":\"AWS Pentesting to Avoid Data Breaches on AWS Cloud Services\",\"headline\":\"AWS Pentesting &#8211; Part &#8211; 1\",\"author\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/AWS-Pentesting-1.png\",\"width\":1060,\"height\":593,\"caption\":\"AWS - Pentesting\"},\"datePublished\":\"2021-03-04T13:44:21+05:30\",\"dateModified\":\"2023-03-24T14:25:02+05:30\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/aws-pentesting-part-1\\\/#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/aws-pentesting-part-1\\\/#webpage\"},\"articleSection\":\"Data Breaches, Data Leakage, Thick Client Penetration Testing, AWS, Cloud security, data breaches, pentesting, VAPT\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/aws-pentesting-part-1\\\/#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"nextItem\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/aws-pentesting-part-1\\\/#listItem\"},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/aws-pentesting-part-1\\\/#listItem\",\"position\":2,\"name\":\"AWS Pentesting - Part - 1\",\"previousItem\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#listItem\"}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\",\"name\":\"Varutra\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Varutra-Found-e1612984024606.jpg\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/aws-pentesting-part-1\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/aws-pentesting-part-1\\\/#organizationLogo\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/#author\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/\",\"name\":\"kalpblogger\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/aws-pentesting-part-1\\\/#authorImage\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5e96a9b330da7c941c1e39217a2fbe38?s=96&d=mm&r=g\",\"width\":96,\"height\":96,\"caption\":\"kalpblogger\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/aws-pentesting-part-1\\\/#webpage\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/aws-pentesting-part-1\\\/\",\"name\":\"AWS Pentesting to Avoid Data Breaches on AWS Cloud Services\",\"description\":\"Understand the different services provided by AWS, data breaches on AWS cloud services, tools used for AWS Pentesting, and how to start with the AWS CLI.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/aws-pentesting-part-1\\\/#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/AWS-Pentesting-1.png\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/aws-pentesting-part-1\\\/#mainImage\",\"width\":1060,\"height\":593,\"caption\":\"AWS - Pentesting\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/aws-pentesting-part-1\\\/#mainImage\"},\"datePublished\":\"2021-03-04T13:44:21+05:30\",\"dateModified\":\"2023-03-24T14:25:02+05:30\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#website\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"name\":\"Varutra Consulting\",\"description\":\"Secure your digital world with our Cybersecurity services.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>AWS Pentesting to Avoid Data Breaches on AWS Cloud Services<\/title>\n\n","aioseo_head_json":{"title":"AWS Pentesting to Avoid Data Breaches on AWS Cloud Services","description":"Understand the different services provided by AWS, data breaches on AWS cloud services, tools used for AWS Pentesting, and how to start with the AWS CLI.","canonical_url":"https:\/\/www.varutra.com\/varutravrt3\/aws-pentesting-part-1\/","robots":"max-image-preview:large","keywords":"","webmasterTools":{"miscellaneous":""},"og:locale":"en_US","og:site_name":"Varutra Consulting","og:type":"article","og:title":"AWS Pentesting to Avoid Data Breaches on AWS Cloud Services","og:description":"Understand the different services provided by AWS, data breaches on AWS cloud services, tools used for AWS Pentesting, and how to start with the AWS CLI.","og:url":"https:\/\/www.varutra.com\/varutravrt3\/aws-pentesting-part-1\/","og:image":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/03\/AWS-Pentesting-1.png","og:image:secure_url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/03\/AWS-Pentesting-1.png","og:image:width":"1060","og:image:height":"593","article:section":"Data Breaches","article:tag":["aws","cloud security","data breaches","pentesting","vapt"],"article:published_time":"2021-03-04T08:14:21+00:00","article:modified_time":"2023-03-24T08:55:02+00:00","twitter:card":"summary_large_image","twitter:title":"AWS Pentesting to Avoid Data Breaches on AWS Cloud Services","twitter:description":"Understand the different services provided by AWS, data breaches on AWS cloud services, tools used for AWS Pentesting, and how to start with the AWS CLI.","twitter:image":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/03\/AWS-Pentesting-1.png","twitter:label1":"Written by","twitter:data1":"kalpblogger","twitter:label2":"Est. reading time","twitter:data2":"5 minutes","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.varutra.com\/varutravrt3\/aws-pentesting-part-1\/#article","name":"AWS Pentesting to Avoid Data Breaches on AWS Cloud Services","headline":"AWS Pentesting &#8211; Part &#8211; 1","author":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/#author"},"publisher":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/03\/AWS-Pentesting-1.png","width":1060,"height":593,"caption":"AWS - Pentesting"},"datePublished":"2021-03-04T13:44:21+05:30","dateModified":"2023-03-24T14:25:02+05:30","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/aws-pentesting-part-1\/#webpage"},"isPartOf":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/aws-pentesting-part-1\/#webpage"},"articleSection":"Data Breaches, Data Leakage, Thick Client Penetration Testing, AWS, Cloud security, data breaches, pentesting, VAPT"},{"@type":"BreadcrumbList","@id":"https:\/\/www.varutra.com\/varutravrt3\/aws-pentesting-part-1\/#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.varutra.com\/varutravrt3\/#listItem","position":1,"name":"Home","item":"https:\/\/www.varutra.com\/varutravrt3\/","nextItem":"https:\/\/www.varutra.com\/varutravrt3\/aws-pentesting-part-1\/#listItem"},{"@type":"ListItem","@id":"https:\/\/www.varutra.com\/varutravrt3\/aws-pentesting-part-1\/#listItem","position":2,"name":"AWS Pentesting - Part - 1","previousItem":"https:\/\/www.varutra.com\/varutravrt3\/#listItem"}]},{"@type":"Organization","@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization","name":"Varutra","url":"https:\/\/www.varutra.com\/varutravrt3\/","logo":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/11\/Varutra-Found-e1612984024606.jpg","@id":"https:\/\/www.varutra.com\/varutravrt3\/aws-pentesting-part-1\/#organizationLogo"},"image":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/aws-pentesting-part-1\/#organizationLogo"}},{"@type":"Person","@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/#author","url":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/","name":"kalpblogger","image":{"@type":"ImageObject","@id":"https:\/\/www.varutra.com\/varutravrt3\/aws-pentesting-part-1\/#authorImage","url":"https:\/\/secure.gravatar.com\/avatar\/5e96a9b330da7c941c1e39217a2fbe38?s=96&d=mm&r=g","width":96,"height":96,"caption":"kalpblogger"}},{"@type":"WebPage","@id":"https:\/\/www.varutra.com\/varutravrt3\/aws-pentesting-part-1\/#webpage","url":"https:\/\/www.varutra.com\/varutravrt3\/aws-pentesting-part-1\/","name":"AWS Pentesting to Avoid Data Breaches on AWS Cloud Services","description":"Understand the different services provided by AWS, data breaches on AWS cloud services, tools used for AWS Pentesting, and how to start with the AWS CLI.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#website"},"breadcrumb":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/aws-pentesting-part-1\/#breadcrumblist"},"author":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/#author"},"creator":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/#author"},"image":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/03\/AWS-Pentesting-1.png","@id":"https:\/\/www.varutra.com\/varutravrt3\/aws-pentesting-part-1\/#mainImage","width":1060,"height":593,"caption":"AWS - Pentesting"},"primaryImageOfPage":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/aws-pentesting-part-1\/#mainImage"},"datePublished":"2021-03-04T13:44:21+05:30","dateModified":"2023-03-24T14:25:02+05:30"},{"@type":"WebSite","@id":"https:\/\/www.varutra.com\/varutravrt3\/#website","url":"https:\/\/www.varutra.com\/varutravrt3\/","name":"Varutra Consulting","description":"Secure your digital world with our Cybersecurity services.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization"}}]}},"aioseo_meta_data":{"post_id":"9262","title":"AWS Pentesting to Avoid Data Breaches on AWS Cloud Services","description":"Understand the different services provided by AWS, data breaches on AWS cloud services, tools used for AWS Pentesting, and how to start with the AWS CLI.","keywords":[],"keyphrases":"{\"focus\":{\"keyphrase\":\"AWS Pentesting\",\"analysis\":{\"keyphraseInTitle\":{\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInDescription\":{\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"score\":9,\"maxScore\":9,\"error\":0,\"length\":2},\"keyphraseInURL\":{\"score\":5,\"maxScore\":5,\"error\":0},\"keyphraseInIntroduction\":{\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInSubHeadings\":{\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInImageAlt\":{\"score\":9,\"maxScore\":9,\"error\":0}},\"score\":80},\"additional\":[{\"keyphrase\":\"Pentesting\",\"score\":83,\"analysis\":{\"keyphraseInDescription\":{\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"score\":9,\"maxScore\":9,\"error\":0,\"length\":1},\"keyphraseInIntroduction\":{\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInImageAlt\":{\"score\":9,\"maxScore\":9,\"error\":0}}},{\"keyphrase\":\"AWS\",\"score\":83,\"analysis\":{\"keyphraseInDescription\":{\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"score\":9,\"maxScore\":9,\"error\":0,\"length\":1},\"keyphraseInIntroduction\":{\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInImageAlt\":{\"score\":9,\"maxScore\":9,\"error\":0}}},{\"keyphrase\":\"Cloud\",\"score\":100,\"analysis\":{\"keyphraseInDescription\":{\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"score\":9,\"maxScore\":9,\"error\":0,\"length\":1},\"keyphraseInIntroduction\":{\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInImageAlt\":{\"score\":9,\"maxScore\":9,\"error\":0}}}]}","primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"featured","og_image_url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/03\/AWS-Pentesting-1.png","og_image_width":"1060","og_image_height":"593","og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":"Data Breaches","og_article_tags":[],"twitter_use_og":true,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"Article","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":"{\"article\":{\"articleType\":\"BlogPosting\"},\"course\":{\"name\":\"\",\"description\":\"\",\"provider\":\"\"},\"faq\":{\"pages\":[]},\"product\":{\"reviews\":[]},\"recipe\":{\"ingredients\":[],\"instructions\":[],\"keywords\":[]},\"software\":{\"reviews\":[],\"operatingSystems\":[]},\"webPage\":{\"webPageType\":\"WebPage\"}}","pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"limit_modified_date":false,"open_ai":null,"created":"2021-10-27 15:11:54","updated":"2023-03-24 09:07:19"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.varutra.com\/varutravrt3\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.varutra.com\/varutravrt3\/category\/data-breaches\/\" title=\"Data Breaches\">Data Breaches<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\tAWS Pentesting \u2013 Part \u2013 1\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.varutra.com\/varutravrt3"},{"label":"Data Breaches","link":"https:\/\/www.varutra.com\/varutravrt3\/category\/data-breaches\/"},{"label":"AWS Pentesting &#8211; Part &#8211; 1","link":"https:\/\/www.varutra.com\/varutravrt3\/aws-pentesting-part-1\/"}],"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/9262"}],"collection":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/comments?post=9262"}],"version-history":[{"count":5,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/9262\/revisions"}],"predecessor-version":[{"id":21209,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/9262\/revisions\/21209"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/media\/9291"}],"wp:attachment":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/media?parent=9262"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/categories?post=9262"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/tags?post=9262"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}