aws_credentials
AWS credentials access
Line 383Snippets
export AWS_ACCESS_KEY_ID=ASIA...export AWS_SECRET_ACCESS_KEY=...export AWS_ACCESS_KEY_ID=ASIA...export AWS_SECRET_ACCESS_KEY=...privilege_escalation
Privilege escalation attempt
Privilege escalation attempt
Line 286Snippets
sudo mkdir /mnt/stolensudo mount /dev/xvdf1 /mnt/stolensudo mkdir /mnt/stolensudo mount /dev/xvdf1 /mnt/stolennetwork_call
Outbound network call
Outbound network call
Line 119Snippets
TOKEN=$(curl -X PUT -H "X-aws-ec2-metadata-token-ttl-seconds: 21600" \curl -H "X-aws-ec2-metadata-token:$TOKEN" \| Get metadata | `curl http://169.254.169.254/latest/meta-data/` || Expired credentials | Re-fetch from metadata (temp creds rotate) |curl https://API_ID.execute-api.REGION.amazonaws.com/STAGE/ENDPOINTTrust Score
Mis a jour il y a 2 semaines
Analyse le
31 mars 2026, 15:56
+ 2 previous scans
Compatible avec
Skill details
Mis a jour il y a 2 semaines
Analyse le 31 mars 2026, 15:56
Description
"Provide comprehensive techniques for penetration testing AWS cloud environments. Covers IAM enumeration, privilege escalation, SSRF to metadata endpoint, S3 bucket exploitation, Lambda code extraction, and persistence techniques for red team operations."
Scans recents
31 mars 2026, 15:56
Latest analysis
31 mars 2026, 15:11
Run 2
27 mars 2026, 15:45
Run 1