Basic AWS Usage
IAM, Role, and Policy Enumeration and Exploitation
Services Enumeration and Exploitation
Miscellaneous Enumeration and Exploitation
This section is for miscellaneous vulnerabilities and techniques