Tech with Tyler
search
Ctrlk
LinkedInGitHubYouTube
  • 👋Welcome!
    • whoami
    • !!! Disclaimer !!!
  • 🎓Academy
    • AWS Security Cookbook by Tylerchevron-right
  • 🤖AI
    • Running LLMs Locallychevron-right
  • ☁️Cloud Security
    • AWSchevron-right
      • AWS Offensive Securitychevron-right
        • AWS Attacks and Techniqueschevron-right
        • AWS Defense Evasionchevron-right
        • AWS Persistencechevron-right
          • Generate IAM Access Keys from CloudShell
          • Creating IAM Access Keys
          • Backdoor an IAM Role
          • Generating Temporary AWS Credentials from IAM User
          • Generating Temporary Credentials from SSO Credentials File
        • AWS Privilege Escalationchevron-right
      • AWS Defensive Securitychevron-right
      • AWS Incident Responsechevron-right
      • AWS Threat Matrix
      • AWS Services Infochevron-right
      • AWS CLI Cheat Sheet
    • Azurechevron-right
    • Capture the Flags (CTFs)chevron-right
    • Toolschevron-right
  • dharmachakraKubernetes & Containers
    • Kubernetes Threat Matrix
    • Kubernetes General Infochevron-right
    • Docker
  • 👨‍💻Coding & CLI Tooling
    • CLI Toolschevron-right
    • Coding and Scriptingchevron-right
    • Proxy Tooling
  • ⚙️DevSecOps
    • CI/CDchevron-right
    • Hashicorp Terraform
    • Hashicorp Vault
    • IAC Scanningchevron-right
    • Secrets Scanningchevron-right
  • 💻Operating Systems
    • Linuxchevron-right
    • macOSchevron-right
  • 🎁Miscellaneous
    • Jenkins
  • 🏗️Projects
    • Active Directory Homelab Automation
    • AWS Cloud Resume Challenge
    • Proxmox Homelab as Code
  • 📌Other
    • Useful Resources
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. ☁️Cloud Securitychevron-right
  2. AWSchevron-right
  3. AWS Offensive Security

AWS Persistence

Techniques threat actors use to maintain persistence in an AWS environment

Generate IAM Access Keys from CloudShellchevron-rightCreating IAM Access Keyschevron-rightBackdoor an IAM Rolechevron-rightGenerating Temporary AWS Credentials from IAM Userchevron-rightGenerating Temporary Credentials from SSO Credentials Filechevron-right
PreviousNonproduction API Endpointschevron-leftNextGenerate IAM Access Keys from CloudShellchevron-right

Last updated 20 days ago