Skip to content

Commit

Permalink
Update ###mmistakes#2023-01-21-IAM-attacking-AWS.md
Browse files Browse the repository at this point in the history
  • Loading branch information
kymb0 committed Jan 21, 2023
1 parent 12356b8 commit b077492
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion _posts/####2023-01-21-IAM-attacking-AWS.md
Original file line number Diff line number Diff line change
Expand Up @@ -60,7 +60,7 @@ We store these secrets in our envrinment variables for our terminal session and

![stolen_key_auth_success](/assets/images/AWS_1/stolen_key_auth_success.jpg)

Unfortunately from here however, we discover the account does not have IAM list privileges after trying to list policies. I even tried to enumerate with an AWS exploit tool called ![PACU](https://github.com/RhinoSecurityLabs/pacu) to see if I was missing anything, it was however a dead on the IAM front. When this happened I said "IAM dissapointed"
Unfortunately from here however, we discover the account does not have IAM list privileges after trying to list policies. I even tried to enumerate with an AWS exploit tool called [PACU](https://github.com/RhinoSecurityLabs/pacu) to see if I was missing anything, it was however a dead-end on the IAM front. When this happened I said "IAM dissapointed"

![dissapointed](/assets/images/AWS_1/dissapointed.gif)
![list_policy_fail](/assets/images/AWS_1/list_policy_fail.jpg)
Expand Down

0 comments on commit b077492

Please sign in to comment.