Mastering AWS ECS Security: Pentesting & Vulnerability Exploitation Guide