Cheatsheet - AWS - Main

Scenario Index Table

Scenario Title Tags Description
IAM Enumeration IAM, Discovery Use the AWS CLI to enumerate IAM users, roles and groups.
Basic S3 Enumeration S3, Discovery Pivot from publicly hosted S3 backed website to IAM access keys
Discover AWS account ID from S3 bucket S3, Discovery, s3-account-search Use S3:ResourceAccount and s3-account-search to locate an AWS account ID using a S3 bucket
Utilise Public EBS Snapshots EBS, Credential theft, Discovery Enumerate and use publicly accessible EBS snapshots
Unauthenticated IAM principal enumeration - IAM role trust policy IAM, Discovery, pacu Enumerate IAM principals via IAM role trust policies
Unauthenticated IAM principal enumeration - S3 and Lambda S3, IAM, Lambda, Discovery Enumerate IAM principals via S3 and Lambda
Uncover credentials with TruffleHog Discovery, Credential Access, Trufflehog Utilise TruffleHog to find credentials in source code
AWS Enumerator and SecretsManager for credential access Discovery, aws-enumerator, SecretsManager, cloudshell Utilise aws-enumerator, SecretsManager and CloudShell to enumerate users and compromise credentials
IAM policy rollback for Privilege Escalation IAM, Privilege Escalation Utilise the iam:SetDefaultPolicyVersion permission for privilege escalation