in ,

Well, That Escalated Quickly, Hacker News

Well, That Escalated Quickly, Hacker News


In 2018,Spencer Gietzen wrote an excellent articleon privilege escalation in AWS, identifying 21 separate methods across various AWS services. I have often used Spencer’s article on engagements to try and find privilege escalation paths in client environments. In doing so, I sometimes needed just a little more information. Some of the escalation techniques identified by Spencer require in-depth knowledge of specific services, or are part of a multi-step process. I wanted to understand more about those details. What are the prerequisites and limitations? What does the escalation path actually look like in practice? To answer these questions, I took it upon myself to test Spencer’s methods. I created the exploit scenarios for each of the 21 techniques in my own AWS environment and verified that I was able to escalate privileges with all of them .

Read More
**********

What do you think?

Leave a Reply

Your email address will not be published. Required fields are marked *

GIPHY App Key not set. Please check settings

The Hawks Are Wasting Trae Young's Historic Breakout Season, Crypto Coins News

The Hawks Are Wasting Trae Young's Historic Breakout Season, Crypto Coins News

Boeing push to make training profitable may have left 737 Max pilots unprepared, Hacker News