Attacking & Defending AWS -- AWS IAM Enumeration

แชร์
ฝัง
  • เผยแพร่เมื่อ 7 ก.พ. 2025
  • TryHackMe - Attacking & Defending AWS: tryhackme.com/...
    Learning Objectives ¯\(◉◡◔)/¯
    Knowing how to get information about AWS IAM resources without authenticating is an important skill for vulnerability assessments and penetration testing. In this room, you will learn how to perform IAM Principal enumeration and partial service enumeration for AWS environments. You will learn:
    How IAM resource policies can be abused to identify valid IAM principals
    How to use open source tools to efficiently enumerate valid principals in a given AWS account
    How to footprint potential services, including security services, enabled for an account
    Remember, these IAM Principals form the backbone of access in AWS - without them, there is almost nothing you can do. By being able to identify what valid principals exist in another AWS account - you form a basis of information to perform more well-informed attacks that are more likely to succeed.

ความคิดเห็น •