AWS makes it possible to retrieve data from an account via multiple methods (or APIs), and some of these are easier than others. This works to our advantage as an attacker because we may be denied access to one permission, but allowed access to another, which can, ultimately, be used to reach the same goal.
Dumping all the account information
A new script – IAM enumeration
In this section, we are going to start out with a new script, and the goal will be to have it enumerate various points of data about the IAM service and the AWS account. The script will start with some of the things that we have already filled in:
#!/usr/bin/env python3
import boto3
session = boto3.session.Session(profile_name='Test', region_name...