Tech with Tyler
Ctrlk
LinkedInGitHubYouTube
  • 👋Welcome!
    • whoami
    • !!! Disclaimer !!!
  • 🎓Academy
    • AWS Security Cookbook by Tyler
    • My content on Cybr
    • My content on PwnedLabs
    • My content on YouTube
  • ☁️Cloud Security
    • AWS Attacks and Techniques
    • AWS Defense Evasion
    • AWS Privilege Escalation
      • Elastic Container Registry (ECR)
      • Identity Access Management (IAM)
      • IAM Trust Policies
      • Key Management Service (KMS)
      • Lightsail
      • OpenID Connect (OIDC)
      • S3
      • Secrets Manager
      • Security Token Service (STS)
    • AWS Incident Response
    • AWS General Info
    • AWS CLI Cheat Sheet
    • Capture the Flags (CTFs)
    • Tools
  • 📦Containers and Orchestration
    • Docker
    • Kubernetes
  • 👨‍💻Coding & CLI Tooling
    • CLI Tools
    • Coding and Scripting
    • Proxy Tooling
    • Touch ID for sudo
    • Terminal Customization
  • ⚙️DevSecOps
    • CI/CD
    • Hashicorp Terraform
    • Hashicorp Vault
    • IAC Scanning
    • Secrets Scanning
  • 🎁Miscellaneous
    • Jenkins
  • 💻Operating Systems
    • Linux
  • 🏗️Projects
    • Active Directory Homelab Automation
    • AWS Cloud Resume Challenge
    • Proxmox Homelab as Code
  • 📌Other
    • Useful Resources
Powered by GitBook
On this page

Was this helpful?

  1. ☁️Cloud Security

AWS Privilege Escalation

Leveraging AWS permissions for privilege escalation and compromise

Elastic Container Registry (ECR)Identity Access Management (IAM)IAM Trust PoliciesKey Management Service (KMS)LightsailOpenID Connect (OIDC)S3Secrets ManagerSecurity Token Service (STS)
PreviousNonproduction API EndpointsNextElastic Container Registry (ECR)

Was this helpful?