Now we are going to bypass CloudTrail to discover information about an account you have gained access to. The first method uses services that aren't supported in CloudTrail to gather basic account information and the second method uses some of that information to enumerate IAM resources in the account, all without generating CloudTrail logs in the target account.
Bypassing logging
Unsupported CloudTrail services for attackers and defenders
As we mentioned earlier in this chapter, CloudTrail doesn't log everything, including many services that are completely unsupported. Again, that list of unsupported services can be found here: https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-unsupported-aws...