EC2

Abusable AWS EC2 permissions that can lead to compromise or privilege escalation

ssm:SendCommand


IMDS

  • If an EC2 is running IMDSv1 or v2, there may be an IAM Role attached to it and we can retrieve the role's credentials through this service

  • We need code execution on the instance (e.g., via SSH, SSM, EC2 Connect) or

Last updated

Was this helpful?