Enumerate AWS IAM Users
Exposure of AWS IAM Usernames can further aid attackers efforts to access an AWS account. Exposure leaves users vulnerable to attacks such as phishing and password-spraying.
What is the risk of exposed AWS IAM Usernames?
Methods to Enumerate AWS IAM Usernames
Using AWS Access Key ID
aws --profile dev iam get-access-key-last-used --access-key-id AKIAxxxxxxxx
{
"UserName": "admin",
"AccessKeyLastUsed": {
"LastUsedDate": "2024-12-08T03:42:00+00:00",
"ServiceName": "ec2",
"Region": "us-east-1"
}
}Using Bedrock API Keys

Using Valid Credentials (Authenticated)
Using Error Messages
Brute Forcing (Unauthenticated)
Last updated