Recon / Initial Access / Enum
AWS - Initial Recon
Recon - AWS Eye
Found an account ID:
AWS Extender - Burp Extension
Credz in git repos
Credentials in git reposCredz on Host - Hardcoded Secrets
Spray AWS Console IAM Logins
IAM User enumeration
Or see IAM part
GoAWSConsoleSpray
To get the ACCOUNTID , run aws sts get-caller-identity with a known account

AWeSomeUserFinder
Subdomain Takeover
AWS Elastic Beanstalk
DNS (53)CloudTap
AWS Enumerator
Credentials found
Cloudfox
Security Groups - Segmentation
AWS Attack Path Management Tool
Authenticated Recon
ScoutSuite
Prowler
White Box Recon
You must have the following privileges (these grant various read access of metadata):
arn:aws:iam::aws:policy/SecurityAuditarn:aws:iam::aws:policy/job-function/ViewOnlyAccess
Interesting Book
Interesting BooksAdvanced Penetration Testing: Hacking AWS 2 This book delves deeper into analyzing the security of various AWS services and shows techniques and tactics used by an attacker to breach an AWS environment
Hands-On AWS Penetration Testing with Kali Linux Set up a virtual lab and pentest major AWS services, including EC2, S3, Lambda, and Cloud
Last updated