AWS Attacks and Techniques
Demonstrating various attacks that can be performed on AWS accounts and services
Enumerate AWS Account IDsEnumerate AWS IAM UsersEnumerate (Unauthenticated) IAM Users and RolesEnumerate AWS Public ResourcesEnumerate Secrets in AWSGenerate AWS Console SessionGenerate IAM Access Keys from CloudShellPassword Spraying AWS IAM UsersSubdomain Takeovers
Was this helpful?