Phishing

We're going to assume the account we compromised has full access to SES so that we can go over all of the attacks, but that may need to be adjusted, depending on what kind of access you find yourself with in a real-life scenario. The first thing we will want to do is look for verified domains and/or email address. These may be isolated to a single region or separated between a few different regions, so it is important to check each region when running these API calls. We can discover these verified domains/email addresses for the us-west-2 region by running the following AWS CLI command:

aws ses list-identities --region us-west-2

The output will contain both domains and email addresses that have been added to that region, regardless ...

Get Hands-On AWS Penetration Testing with Kali Linux now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.