We're going to assume the account we compromised has full access to SES so that we can go over all of the attacks, but that may need to be adjusted, depending on what kind of access you find yourself with in a real-life scenario. The first thing we will want to do is look for verified domains and/or email address. These may be isolated to a single region or separated between a few different regions, so it is important to check each region when running these API calls. We can discover these verified domains/email addresses for the us-west-2 region by running the following AWS CLI command:
aws ses list-identities --region us-west-2
The output will contain both domains and email addresses that have been added to that region, regardless ...