From CLI to console, chasing an attacker in AWS