Tech with Tyler
search
โŒ˜Ctrlk
LinkedInGitHubYouTube
Tech with Tyler
  • ๐Ÿ‘‹Welcome!
    • whoami
    • !!! Disclaimer !!!
  • ๐ŸŽ“Academy
    • AWS Security Cookbook by Tyler
    • My content on Cybr
    • My content on PwnedLabs
    • My content on YouTube
  • ๐Ÿค–AI
    • Running LLMs Locally
  • โ˜๏ธCloud Security
    • AWS
      • AWS Offensive Security
        • AWS Attacks and Techniques
        • AWS Defense Evasion
        • AWS Persistence
          • Generate IAM Access Keys from CloudShell
          • Creating IAM Access Keys
          • Backdoor an IAM Role
          • Generating Temporary AWS Credentials from IAM User
          • Generating Temporary Credentials from SSO Credentials File
        • AWS Privilege Escalation
      • AWS Defensive Security
      • AWS Incident Response
      • AWS Threat Matrix
      • AWS General Info
      • AWS CLI Cheat Sheet
    • Azure
    • Capture the Flags (CTFs)
    • Tools
  • dharmachakraKubernetes & Containers
    • Kubernetes Threat Matrix
    • Kubernetes General Info
    • Docker
  • ๐Ÿ‘จโ€๐Ÿ’ปCoding & CLI Tooling
    • CLI Tools
    • Coding and Scripting
    • Proxy Tooling
  • โš™๏ธDevSecOps
    • CI/CD
    • Hashicorp Terraform
    • Hashicorp Vault
    • IAC Scanning
    • Secrets Scanning
  • ๐Ÿ’ปOperating Systems
    • Linux
    • macOS
  • ๐ŸŽMiscellaneous
    • Jenkins
  • ๐Ÿ—๏ธProjects
    • Active Directory Homelab Automation
    • AWS Cloud Resume Challenge
    • Proxmox Homelab as Code
  • ๐Ÿ“ŒOther
    • Useful Resources
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. โ˜๏ธCloud Securitychevron-right
  2. AWSchevron-right
  3. AWS Offensive Security

AWS Persistence

Techniques threat actors use to maintain persistence in an AWS environment

Generate IAM Access Keys from CloudShellchevron-rightCreating IAM Access Keyschevron-rightBackdoor an IAM Rolechevron-rightGenerating Temporary AWS Credentials from IAM Userchevron-rightGenerating Temporary Credentials from SSO Credentials Filechevron-right
PreviousNonproduction API Endpointschevron-leftNextGenerate IAM Access Keys from CloudShellchevron-right

Last updated 2 months ago