Common Security Vulnerabilities in Core AWS Services: Exploitation and Mitigation