AWS IAM Privilege Escalation Methods Logo

AWS IAM Privilege Escalation Methods

0
Free
Visit Website

An attacker with the iam:CreatePolicyVersion permission can create a new version of an IAM policy that they have access to. This allows them to define their own custom permissions. When creating a new policy version, it needs to be set as the default version to take effect, which you would think would require the iam:SetDefaultPolicyVersion permission, but when creating a new policy version, it is possible to include a flag (--set-as-default) that will automatically create it as the new default version. That flag does not require the iam:SetDefaultPolicyVersion permission to use. This privilege escalation method could allow a user to gain full administrator access of the AWS account.

FEATURES

ALTERNATIVES

A decentralized identity verification solution that enables organizations to issue, manage, and verify digital credentials for user-owned identity scenarios.

Commercial

Abusing DNSAdmins privilege for escalation in Active Directory

Free

DumpsterDiver is a tool for analyzing big volumes of data to find hardcoded secrets like keys and passwords.

Free

Open-source universal secret manager for developers with seamless integration to various cloud services and vaults.

Free

Securely store and access AWS credentials in a development environment.

Free

Monokee is an identity orchestration and access management platform that provides visual, low-code tools for designing authentication workflows, managing digital identities, and implementing secure access controls across multiple domains.

Commercial

A NodeJS/Typescript library for generating IAM Policy Actions Statements for AWS CDK with predefined constants and a factory class.

Free

Encrypt Kubernetes Secrets into SealedSecrets for safe storage and controlled decryption within the cluster.

Free

PINNED