Authenticated reconnaissance plus permissions enumeration

To begin the authenticated recon portion of our assessment, we will need to use the swap_keys Pacu command to switch from our PersonalUser to the CompromisedUser:

  1. Run swap_keys in Pacu to switch to the CompromisedUser.
  1. The first thing to do for authenticated recon is to find out our own privileges so that we know what kind of access we have to the AWS account. This can be done by using the iam__enum_permissions Pacu module. It doesn't need any arguments for our current purpose, so we can run the following command:
run iam__enum_permissions
  1. Next, we can check out what permissions were enumerated with the whoami command:
Running iam__enum_permissions and checking out what data ...

Get Hands-On AWS Penetration Testing with Kali Linux now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.