Hacking in the Cloud - lambda_privesc

Hacking in the Cloud - lambda_privesc

in

We start off as a low-privileged user who can perform IAM Get and IAM List on all resources. In addition, this user can assume a role which has lambda:* and iam:PassRole on all resources. Using this permission, it was possible to create a function with another role that had AdministratorAccess attached to it. Therefore, we were able to attach AdministratorAccess on the low-privileged user.


00:00 - Video Context
01:16 - Enumerating User Permissions
03:46 - Enumerating roles
08:05 - Identifying exploitation path and assuming lambaManager role
11:29 - Creating lambda function exploit
17:51 - Running exploit with lambda:Invoke