🎯Attacks, Techniques, and Tools
Tools and techniques for attacking, exploiting, and enumerating AWS IAM
Abusing Vulnerable Trust Policies
Poorly written IAM Trust Policies can lead to compromise.
AWS Service Trust Policy
Bad policy
This policy allows the Lambda service in any AWS account to assume the role. An attacker only needs to know the ARN of the role.
Better policy
The role assumption is restricted to a particular lambda function within a particular AWS account.
AWS Identity Federation Trust Policy
Bad Policy
This policy allows any GitLab instance to assume the role. An attacker only needs to know the ARN of the role.
Better policy
The role assumption is restricted to a particular GitLab project path.
Resources
Last updated