MCRTA Study Material-AWS PDF
MCRTA Study Material-AWS PDF
2. Authentication Methods
Cloud Space
Compute
VPC
Networking
Compute
IAM
Identity Access
Management
AWS
services
SSO
Security
Storage
IAM
Cloud Trail
EBS
S3
CloudWatch Guard duty RDS
IAM :
➤ AWS Identity and Access Management (IAM) enables you to manage access to AWS services
and resources securely.
➤ IAM allow you can create and manage AWS users and groups and use permissions to allow
and deny their access to AWS resources.
Policy
➤ An AWS Identity and Access Management (IAM) user is an entity that you create in AWS to
➤ An IAM group is a collection of IAM users. Groups let you specify permissions for multiple
users, which can make it easier to manage the permissions for those users
➤ An IAM role is an IAM entity that defines a set of permissions for making AWS service requests.
➤ IAM roles are associated with AWS services such as EC2, RDS etc.
Full permission
➤ For example, if a policy allows the GetUser action, then a user with that policy can get user
information from the AWS Management Console, the AWS CLI, or the AWS API.
➤ Policies can be attached to IAM identities (users, groups or roles) or AWS resources.
➤ Action - Include a list of actions (Get, Put, Delete) that the policy allows or denies.
➤
➤ Managed Policies -
Credentials
Access Key ID
IAM Username & Password Access Key ID Secret Access Key
SSO Username & Password Secret Access Key Session Token
https://console.aws.amazon.com/
https://console.aws.amazon.com/
https://Org-Name.awsapps.com/start
aws configure
Windows
C:\Users\UserName\.aws
Linux
/home/UserName/.aws
cat credentials
Users:
List the IAM groups that the specified IAM user belongs to :
Lists the names of the inline policies embedded in the specified IAM user :
List the names of the inline policies embedded in the specified IAM Group:
Lists all managed policies that are attached to the specified IAM role :
List the names of the inline policies embedded in the specified IAM role :
Retrieves the specified inline policy document that is embedded on the specified IAM user / group / role :
curl http://169.254.169.254/latest/meta-data/iam/security-credentials/jump-ec2-role
Note: Cloud meta-data can be retrieve by exploiting these web app vulnerabilities -
● SSRF
● RCE
Retrieves the specified inline policy document that is embedded on the ec2 instance role :
--profile auditor
set_keys
exec iam__enum_permissions
whoami
exec ec2__enum
data EC2
set_keys
exec iam__enum_permissions
whoami
exec iam__privesc_scan
exec iam__enum_permissions
whoami
info@cyberwarfare.live