Privilege Escalation Through AWS IAM Instance Profile Role

In Summary : Usually, the worst an attacker can do is launch more EC2 instances. However, since Bob's account has an IAM policy that ...

In Summary :

Usually, the worst an attacker can do is launch more EC2 instances. However, since Bob's account has an IAM policy that allow attaching any instance role, the attacker can simply find a role which has privileged access and attach the role to an instance. From there, the attacker can log into the EC2 instance and run AWS CLI commands and do virtually anything that the privileged role allows [...]

kindly refer the following link as follow up :
https://ift.tt/2FXkNNx

Post a Comment

emo-but-icon
:noprob:
:smile:
:shy:
:trope:
:sneered:
:happy:
:escort:
:rapt:
:love:
:heart:
:angry:
:hate:
:sad:
:sigh:
:disappointed:
:cry:
:fear:
:surprise:
:unbelieve:
:shit:
:like:
:dislike:
:clap:
:cuff:
:fist:
:ok:
:file:
:link:
:place:
:contact:

Home item

ADS

Popular Posts

Random Posts

Flickr Photo

StatCounter

View My Stats