Tech with Tyler
search
โŒ˜Ctrlk
LinkedInGitHubYouTube
Tech with Tyler
  • ๐Ÿ‘‹Welcome!
    • whoami
    • !!! Disclaimer !!!
  • ๐ŸŽ“Academy
    • AWS Security Cookbook by Tyler
    • My content on Cybr
    • My content on PwnedLabs
    • My content on YouTube
  • ๐Ÿค–AI
    • Running LLMs Locally
  • โ˜๏ธCloud Security
    • AWS
      • AWS Offensive Security
        • AWS Attacks and Techniques
          • Enumerate AWS Organization ID
          • Enumerate AWS Account IDs
          • Enumerate AWS IAM Users
          • Enumerate (Unauthenticated) IAM Users and Roles
          • Enumerate AWS Public Resources
          • Enumerate Secrets in AWS
          • Generate AWS Console Session
          • Generate IAM Access Keys from CloudShell
          • Password Spraying AWS IAM Users
          • Server Side Request Forgery (SSRF)
          • Subdomain Takeovers
        • AWS Defense Evasion
        • AWS Persistence
        • AWS Privilege Escalation
      • AWS Defensive Security
      • AWS Incident Response
      • AWS Threat Matrix
      • AWS General Info
      • AWS CLI Cheat Sheet
    • Azure
    • Capture the Flags (CTFs)
    • Tools
  • dharmachakraKubernetes & Containers
    • Kubernetes Threat Matrix
    • Kubernetes General Info
    • Docker
  • ๐Ÿ‘จโ€๐Ÿ’ปCoding & CLI Tooling
    • CLI Tools
    • Coding and Scripting
    • Proxy Tooling
  • โš™๏ธDevSecOps
    • CI/CD
    • Hashicorp Terraform
    • Hashicorp Vault
    • IAC Scanning
    • Secrets Scanning
  • ๐Ÿ’ปOperating Systems
    • Linux
    • macOS
  • ๐ŸŽMiscellaneous
    • Jenkins
  • ๐Ÿ—๏ธProjects
    • Active Directory Homelab Automation
    • AWS Cloud Resume Challenge
    • Proxmox Homelab as Code
  • ๐Ÿ“ŒOther
    • Useful Resources
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. โ˜๏ธCloud Securitychevron-right
  2. AWSchevron-right
  3. AWS Offensive Security

AWS Attacks and Techniques

Demonstrating various attacks that can be performed on AWS accounts and services

Enumerate AWS Organization IDchevron-rightEnumerate AWS Account IDschevron-rightEnumerate AWS IAM Userschevron-rightEnumerate (Unauthenticated) IAM Users and Roleschevron-rightEnumerate AWS Public Resourceschevron-rightEnumerate Secrets in AWSchevron-rightGenerate AWS Console Sessionchevron-rightGenerate IAM Access Keys from CloudShellchevron-rightPassword Spraying AWS IAM Userschevron-rightServer Side Request Forgery (SSRF)chevron-rightSubdomain Takeoverschevron-right
PreviousAWS Offensive Securitychevron-leftNextEnumerate AWS Organization IDchevron-right