This document provides an overview of pentesting AWS environments. It discusses initial reconnaissance of AWS accounts and resources, identifying vulnerabilities, techniques for lateral movement and privilege escalation, and ways to scale pentests across multiple AWS accounts. The presentation covers topics like using ScoutSuite and custom tools to discover resources and analyze policies, exploiting permissions and services, leveraging IAM roles and the EC2 metadata service, and exfiltrating data from S3 buckets and EBS snapshots. It emphasizes the importance of proper scoping and reporting when pentesting at scale in AWS environments.