πŸ§‘β€πŸ’»
B00t2R00t
search
⌘Ctrlk
πŸ§‘β€πŸ’»
B00t2R00t
  • README
  • LICENSE
  • Active Directory Penetration Testing
  • Artificial Intelligence (AI) Penetration Testing
  • TODO LATER:
  • CVE
  • Cloud Penetration Testing
    • Resources to study later
    • AWS (Amazon Web Services)
      • AWS API calls that return credentials
      • AWS Patterns
      • Amazon DynamoDB
      • AWS - Copy EC2 using AMI Image
      • Disable CloudTrail
      • AWS - Golden SAML
      • AWS - Instance Connect - Push an SSH key to EC2 instance
      • AWS - Mount EBS volume to EC2 Linux
      • Shadow Admin
      • AWS - Shadow Copy Attack
      • ARN
      • CloudTrail
      • Containers
      • EBS
      • EC2
      • EKS (Kubernetes)
      • Enumeration
        • AWS Account ID Enumeration
        • Enumerate IAM permissions
      • Exploitation
      • Identity Access Management (IAM)
      • Lambda and API Gateway
      • Misc
      • Persistence
      • Privilege Escalation
      • RDS
      • Secrets Manager
      • Simple Storage System (S3)
      • Tools
      • Virtual Private Cloud (VPC)
    • Cross-Platform
    • Google Cloud Platform (GCP)
    • Kubernetes
    • Microsoft Azure
  • Data Lake Penetration Testing
  • Exploit Development
  • Methodology
  • Network Penetration Testing
  • Pivoting
  • Web Application Penetration Testing
  • Wireless Penetration Testing
  • Miscellaneous
  • Privilege Escalation
  • Red Teaming
  • Tools
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Cloud Penetration Testingchevron-right
  2. AWS (Amazon Web Services)

Enumeration

AWS Account ID Enumerationchevron-rightEnumerate IAM permissionschevron-right
PreviousSupply Chain Poisoningchevron-leftNextAWS Account ID Enumerationchevron-right

Last updated 8 months ago