
Exploiting AWS IAM Security permissions Part 2
Introduction In part 1 we compromised an account with multiple permissions, but no Administrator access. We found a potential role that would allow us to escalate privileges,
Introduction In part 1 we compromised an account with multiple permissions, but no Administrator access. We found a potential role that would allow us to escalate privileges,
Introduction This is a real case study of how to enumerate and use AWS IAM permissions to your advantage. I strongly suggest you read my previous article on how