Size: Small
Difficulty: Easy
Command: ./cloudgoat.py create iam_privesc_by_key_rotation
- 3 IAM User
- 1 IAM Role
- 1 Secret
- IAM User "manager"
Retrieve AWS secret
Exploit insecure IAM permissions to escalate your access. Start with a role that manages other users credentials and find a weakness in the setup to access the "admin" role. Using the admin role retrieve the flag from secretsmanager.
Spoiler warning
- Starting with the manager user add a tag to the admin user
- Delete and add a new access key to the admin user
- Create and attach a MFA device to the admin user
- Switch to the admin user
- Assume the secretsmanager role with MFA
- Retrieve the secret
A full cheat_sheet can be found here