Skip to content

Commit

Permalink
Fixed title reference for Survive Access Key Deletion with sts:GetFed…
Browse files Browse the repository at this point in the history
…erationToken
  • Loading branch information
Frichetten committed Sep 25, 2023
1 parent a774136 commit d397ab6
Show file tree
Hide file tree
Showing 2 changed files with 3 additions and 3 deletions.
4 changes: 2 additions & 2 deletions content/aws/post_exploitation/iam_persistence.md
Original file line number Diff line number Diff line change
Expand Up @@ -85,15 +85,15 @@ An adversary could invoke `iam:UpdateAssumeRolePolicy`, specifying that their ow
For the defensive side; it is a good idea to regularly audit role trust policies that establish trust with AWS accounts outside of your organization. In most cases, this will likely identify SaaS and vendor [AWS accounts](https://github.com/fwdcloudsec/known_aws_accounts), however it may turn up something much more nefarious.


## Maintain Persistence with sts:GetFederationToken
## Survive Access Key Deletion with sts:GetFederationToken

<div class="grid cards" markdown>

- :material-link-box-outline:{ .lg .middle } __Technique Article__

---

- [Maintain Persistence with sts:GetFederationToken](https://hackingthe.cloud/aws/post_exploitation/maintain_persistence_with_sts_getfederationtoken/)
- [Survive Access Key Deletion with sts:GetFederationToken](https://hackingthe.cloud/aws/post_exploitation/survive_access_key_deletion_with_sts_getfederationtoken/)

</div>

Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
---
author_name: Nick Frichette
title: Survive Access Key Deletion with sts:GetFederationToken
description: Using sts:GetFederationToken to maintain access, even if the original IAM credentials are revoked.
description: Use sts:GetFederationToken to maintain access, even if the original IAM credentials are revoked.
hide:
- toc
---
Expand Down

0 comments on commit d397ab6

Please sign in to comment.