Tech with Tyler
Ctrlk
LinkedInGitHubYouTube
  • 👋Welcome!
    • whoami
    • !!! Disclaimer !!!
  • 🎓Academy
    • AWS Security Cookbook by Tyler
    • My content on Cybr
    • My content on PwnedLabs
    • My content on YouTube
  • ☁️Cloud Security
    • AWS Offensive Security
      • AWS Attacks and Techniques
      • AWS Defense Evasion
      • AWS Persistence
        • Generate IAM Access Keys from CloudShell
        • Creating IAM Access Keys
        • Backdoor an IAM Role
        • Generating Temporary AWS Credentials from IAM User
        • Generating Temporary Credentials from SSO Credentials File
      • AWS Privilege Escalation
    • AWS Defensive Security
    • AWS Incident Response
    • AWS Threat Matrix
    • AWS General Info
    • AWS CLI Cheat Sheet
    • Capture the Flags (CTFs)
    • Tools
  • Kubernetes & Containers
    • Kubernetes Threat Matrix
    • Kubernetes General Info
    • Docker
  • 👨‍💻Coding & CLI Tooling
    • CLI Tools
    • Coding and Scripting
    • Proxy Tooling
    • Touch ID for sudo
    • Terminal Customization
  • ⚙️DevSecOps
    • CI/CD
    • Hashicorp Terraform
    • Hashicorp Vault
    • IAC Scanning
    • Secrets Scanning
  • 🎁Miscellaneous
    • Jenkins
  • 💻Operating Systems
    • Linux
  • 🏗️Projects
    • Active Directory Homelab Automation
    • AWS Cloud Resume Challenge
    • Proxmox Homelab as Code
  • 📌Other
    • Useful Resources
Powered by GitBook
On this page

Was this helpful?

  1. ☁️Cloud Security
  2. AWS Offensive Security

AWS Persistence

Techniques threat actors use to maintain persistence in an AWS environment

Generate IAM Access Keys from CloudShellCreating IAM Access KeysBackdoor an IAM RoleGenerating Temporary AWS Credentials from IAM UserGenerating Temporary Credentials from SSO Credentials File
PreviousNonproduction API EndpointsNextGenerate IAM Access Keys from CloudShell

Last updated 4 days ago

Was this helpful?