Abusable AWS EC2 permissions that can lead to compromise or privilege escalation
If an EC2 is running IMDSv1 or v2, there may be an IAM Role attached to it and we can retrieve the role's credentials through this service
We need code execution on the instance (e.g., via SSH, SSM, EC2 Connect) or
Last updated 1 month ago