aws_credentials
AWS credentials access
Line 383Snippets
export AWS_ACCESS_KEY_ID=ASIA...export AWS_SECRET_ACCESS_KEY=...export AWS_ACCESS_KEY_ID=ASIA...export AWS_SECRET_ACCESS_KEY=...privilege_escalation
Privilege escalation attempt
Privilege escalation attempt
Line 286Snippets
sudo mkdir /mnt/stolensudo mount /dev/xvdf1 /mnt/stolensudo mkdir /mnt/stolensudo mount /dev/xvdf1 /mnt/stolennetwork_call
Outbound network call
Outbound network call
Line 119Snippets
TOKEN=$(curl -X PUT -H "X-aws-ec2-metadata-token-ttl-seconds: 21600" \curl -H "X-aws-ec2-metadata-token:$TOKEN" \| Get metadata | `curl http://169.254.169.254/latest/meta-data/` || Expired credentials | Re-fetch from metadata (temp creds rotate) |curl https://API_ID.execute-api.REGION.amazonaws.com/STAGE/ENDPOINTTrust Score
Updated há 2 semanas
Analisado
31 de mar. de 2026, 15:56
+ 2 previous scans
Compatível com
Skill details
Updated há 2 semanas
Analisado 31 de mar. de 2026, 15:56
Descricao
"Provide comprehensive techniques for penetration testing AWS cloud environments. Covers IAM enumeration, privilege escalation, SSRF to metadata endpoint, S3 bucket exploitation, Lambda code extraction, and persistence techniques for red team operations."
Scans recentes
31 de mar. de 2026, 15:56
Latest analysis
31 de mar. de 2026, 15:11
Run 2
27 de mar. de 2026, 15:45
Run 1