In this chapter, we have covered how to use the Python boto3 library to our advantage during an AWS pentest. It allows us to quickly and simply automate parts of our attack process, where we specifically covered how to enumerate IAM permissions for ourselves and others in the environment (in two different ways) and how to apply that knowledge to escalate our privileges to hopefully become a full administrator of the account.
We also looked at how a lot of this process has already been automated for us in Pacu. As nice as it would be, Pacu can't encompass every idea, attack methodology, or exploit that you think of, so it is important to learn how to use the AWS libraries to properly interact with the AWS APIs outside of Pacu. Then, with that knowledge, you could even begin writing your own Pacu modules for others to enjoy.
In the next chapter, we are going to continue...