diff --git a/content/aws/exploitation/Misconfigured_Resource-Based_Policies/exploting_public_resources_attack_playbook.md b/content/aws/exploitation/Misconfigured_Resource-Based_Policies/exploting_public_resources_attack_playbook.md index bdbcea3bf..31bc7ddea 100644 --- a/content/aws/exploitation/Misconfigured_Resource-Based_Policies/exploting_public_resources_attack_playbook.md +++ b/content/aws/exploitation/Misconfigured_Resource-Based_Policies/exploting_public_resources_attack_playbook.md @@ -4,6 +4,8 @@ title: Exploiting Public AWS Resources Programmatically - The Playbook description: A playbook on how to exploit AWS resources that can be misconfigured via resource-based policies. --- +# Exploiting Public AWS Resources - CLI Attack Playbook +
- :material-tools:{ .lg .middle } __Tools mentioned in this article__ @@ -15,9 +17,7 @@ description: A playbook on how to exploit AWS resources that can be misconfigure [coldsnap](https://github.com/awslabs/coldsnap): A command line interface for Amazon EBS snapshots
-# Exploiting Public AWS Resources - CLI Attack Playbook - -The playbook shows how to exploit AWS resources that can be misconfigured to be publicly accessible. Think of it as a glossary of quick exploitation techniques that can be performed programmatically. +This playbook shows how to exploit AWS resources that can be misconfigured to be publicly accessible. Think of it as a glossary of quick exploitation techniques that can be performed programmatically. All attacks are meant to be executed from an external environment where the attacker is ideally an administrator.