Skip to content

Commit 320debe

Browse files
authored
Merge pull request nccgroup#118 from Hacking-the-Cloud/revert_aws_consoler
Revert: Removed permissions needed for AWS Consoler
2 parents 994d324 + bb0c9ac commit 320debe

File tree

1 file changed

+2
-1
lines changed

1 file changed

+2
-1
lines changed

content/aws/post_exploitation/aws_consoler.md

+2-1
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,8 @@ description: "Leverage stolen credentials to use the AWS Console."
77
Original Research: [Ian Williams](https://blog.netspi.com/gaining-aws-console-access-via-api-keys/)
88
Link to Tool: [GitHub](https://github.com/NetSPI/aws_consoler)
99

10-
__Required IAM Permissions__: sts:GetFederationToken OR sts:AssumeRole.
10+
!!! Note
11+
It is a good idea to install AWS Consoler in a Docker container or other disposable environment. The dependencies on the project may affect your existing AWS CLI install.
1112

1213
When performing an AWS assessment you will likely encounter IAM Credentials. Traditionally, the majority of these that you would find would only be usable from the AWS CLI. Using a tool called [AWS Consoler](https://github.com/NetSPI/aws_consoler) you can create links that will allow you to access the AWS Console. In this example we will walk through gathering credentials and using those credentials along with Consoler to generate a Console link.
1314

0 commit comments

Comments
 (0)