Senior Security Consultant Gerben Kleijn's created and documented exploit scenarios for 21 AWS privilege escalation methods to fully understand the vulnerabilities introduced by certain AWS permissions.
In 2018, Spencer Gietzen wrote an excellent article on privilege escalation in AWS, identifying 21 separate methods across various AWS services. Pen testers often use Spencer’s article on engagements to try and find privilege escalation paths in client environments. Some of the escalation techniques identified by Spencer require in-depth knowledge of specific services, or are part of a multi-step process. But, what are the prerequisites and limitations? What does the escalation path actually look like in practice?
To answer these questions, Gerben Kleijn, a senior security consultant at Bishop Fox, took it upon himself to test Spencer’s methods. He created the exploit scenarios for each of the 21 techniques in his own AWS environment and verified that that one can escalate privileges with all of them. These exercises can be very helpful to fully understand the vulnerabilities introduced by certain AWS permissions. Gerben also sorted these 21 methods into five larger categories and developed a cheat sheet to help remember the overall privesc threats to AWS.
An in-depth walkthrough of the exploit scenarios for each of the 21 techniques for escalating privileges in an AWS environment.
In reviewing the 21 methods across various AWS services that could lead to privilege escalation, Gerben Kleijn found that the techniques can be sorted into five rough categories. This article discusses those categories at a high level, and what to look out for in each category if you’re the one setting up user permissions.
Gerben Kleijn (OSCP, CISSP) is a Senior Security Consultant for Bishop Fox, where he primarily focuses on external network penetration tests and web application assessments, as well as cloud deployment reviews for Amazon Web Services (AWS). He has advised Fortune 500 brands and startups in industries such as media, retail, and software in addition to popular websites, credit reporting agencies, and marketing platforms.
LinkedIn: https://www.linkedin.com/in/ge...
Aug 28, 2018
An Introduction to AWS Cloud Security
By Gerben Kleijn
Sep 23, 2021
IAM Vulnerable - Assessing the AWS Assessment Tools
By Seth Art
Jul 10, 2018
A Guide to AWS S3 Buckets Security
By Gerben Kleijn
Feb 13, 2015
Stand Your Cloud: A Series on Securing AWS
By Ruihai Fang
Sep 09, 2021
IAM Vulnerable - An AWS IAM Privilege Escalation Playground
By Seth Art
Oct 07, 2015
Fishing the AWS IP Pool for Dangling Domains
By Matt Bryant
Nov 14, 2017
Stand Your Cloud #3: AWS Provisioning and Access Requests
By Gerben Kleijn
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.