Tech with Tyler
Ctrlk
LinkedInGitHubYouTube
  • 👋Welcome!
    • whoami
    • !!! Disclaimer !!!
  • 🎓Academy
    • AWS Security Cookbook by Tyler
    • My content on Cybr
    • My content on PwnedLabs
    • My content on YouTube
  • ☁️Cloud Security
    • AWS Offensive Security
      • AWS Attacks and Techniques
      • AWS Defense Evasion
      • AWS Persistence
      • AWS Privilege Escalation
        • Elastic Container Registry (ECR)
        • Identity Access Management (IAM)
        • IAM Trust Policies
        • Key Management Service (KMS)
        • Lightsail
        • OpenID Connect (OIDC)
        • S3
        • Secrets Manager
        • Security Token Service (STS)
    • AWS Defensive Security
    • AWS Incident Response
    • AWS Threat Matrix
    • AWS General Info
    • AWS CLI Cheat Sheet
    • Capture the Flags (CTFs)
    • Tools
  • Kubernetes & Containers
    • Kubernetes Threat Matrix
    • Kubernetes General Info
    • Docker
  • 👨‍💻Coding & CLI Tooling
    • CLI Tools
    • Coding and Scripting
    • Proxy Tooling
    • Touch ID for sudo
    • Terminal Customization
  • ⚙️DevSecOps
    • CI/CD
    • Hashicorp Terraform
    • Hashicorp Vault
    • IAC Scanning
    • Secrets Scanning
  • 🎁Miscellaneous
    • Jenkins
  • 💻Operating Systems
    • Linux
  • 🏗️Projects
    • Active Directory Homelab Automation
    • AWS Cloud Resume Challenge
    • Proxmox Homelab as Code
  • 📌Other
    • Useful Resources
Powered by GitBook
On this page

Was this helpful?

  1. ☁️Cloud Security
  2. AWS Offensive Security

AWS Privilege Escalation

Leveraging AWS permissions for privilege escalation and compromise

Elastic Container Registry (ECR)Identity Access Management (IAM)IAM Trust PoliciesKey Management Service (KMS)LightsailOpenID Connect (OIDC)S3Secrets ManagerSecurity Token Service (STS)
PreviousGenerating Temporary Credentials from SSO Credentials FileNextElastic Container Registry (ECR)

Was this helpful?