Tech with Tyler
Ctrlk
LinkedInGitHubYouTube
  • 👋Welcome!
    • whoami
    • !!! Disclaimer !!!
  • 🎓Academy
    • AWS Security Cookbook by Tyler
    • My content on Cybr
    • My content on PwnedLabs
    • My content on YouTube
  • ☁️Cloud Security
    • AWS Offensive Security
      • AWS Attacks and Techniques
        • Enumerate AWS Organization ID
        • Enumerate AWS Account IDs
        • Enumerate AWS IAM Users
        • Enumerate (Unauthenticated) IAM Users and Roles
        • Enumerate AWS Public Resources
        • Enumerate Secrets in AWS
        • Generate AWS Console Session
        • Generate IAM Access Keys from CloudShell
        • Password Spraying AWS IAM Users
        • Server Side Request Forgery (SSRF)
        • Subdomain Takeovers
      • AWS Defense Evasion
      • AWS Persistence
      • AWS Privilege Escalation
    • AWS Defensive Security
    • AWS Incident Response
    • AWS Threat Matrix
    • AWS General Info
    • AWS CLI Cheat Sheet
    • Capture the Flags (CTFs)
    • Tools
  • Kubernetes & Containers
    • Kubernetes Threat Matrix
    • Kubernetes General Info
    • Docker
  • 👨‍💻Coding & CLI Tooling
    • CLI Tools
    • Coding and Scripting
    • Proxy Tooling
    • Touch ID for sudo
    • Terminal Customization
  • ⚙️DevSecOps
    • CI/CD
    • Hashicorp Terraform
    • Hashicorp Vault
    • IAC Scanning
    • Secrets Scanning
  • 🎁Miscellaneous
    • Jenkins
  • 💻Operating Systems
    • Linux
  • 🏗️Projects
    • Active Directory Homelab Automation
    • AWS Cloud Resume Challenge
    • Proxmox Homelab as Code
  • 📌Other
    • Useful Resources
Powered by GitBook
On this page

Was this helpful?

  1. ☁️Cloud Security
  2. AWS Offensive Security

AWS Attacks and Techniques

Demonstrating various attacks that can be performed on AWS accounts and services

Enumerate AWS Organization IDEnumerate AWS Account IDsEnumerate AWS IAM UsersEnumerate (Unauthenticated) IAM Users and RolesEnumerate AWS Public ResourcesEnumerate Secrets in AWSGenerate AWS Console SessionGenerate IAM Access Keys from CloudShellPassword Spraying AWS IAM UsersServer Side Request Forgery (SSRF)Subdomain Takeovers
PreviousAWS Offensive SecurityNextEnumerate AWS Organization ID

Was this helpful?