Hallo zusammen,
sofern nicht selber schon gesehen/-lesen hier [0] FYI
"CloudFox" (siehe dazu auch [1])
... helps you answer the following common questions (and many more):
What regions is this AWS account using and roughly how many resources are in the account? What secrets are lurking in EC2 userdata or service specific environment variables?
What actions/permissions does this [principal] have?
What roles trusts are overly permissive or allow cross-account assumption?
What endpoints/hostnames/IPs can I attack from an external starting point (public internet)?
What endpoints/hostnames/IPs can I attack from an internal starting point (assumed breach within the VPC)?
What filesystems can I potentially mount from a compromised resource inside the VPC?
VG
Bernd
[0] https://github.com/BishopFox/cloudfox
[1] https://bishopfox.com/blog/introducing-cloudfox
rwth-security@lists.rwth-aachen.de