From 2e1e0dddb401cb9d6db1f94401b988ce67c4c8e4 Mon Sep 17 00:00:00 2001 From: Nick Frichette Date: Thu, 8 Feb 2024 20:53:25 -0600 Subject: [PATCH] Added cards to stealh_perm_enum --- content/aws/deprecated/stealth_perm_enum.md | 18 ++++++++++++++++-- 1 file changed, 16 insertions(+), 2 deletions(-) diff --git a/content/aws/deprecated/stealth_perm_enum.md b/content/aws/deprecated/stealth_perm_enum.md index d3e3c6871..9307773c5 100644 --- a/content/aws/deprecated/stealth_perm_enum.md +++ b/content/aws/deprecated/stealth_perm_enum.md @@ -8,8 +8,22 @@ hide: # [Deprecated] Enumerate Permissions without Logging to CloudTrail -Original Research: [Nick Frichette](https://frichetten.com/blog/aws-api-enum-vuln/) -Link to Tool: [aws_stealth_perm_enum](https://github.com/Frichetten/aws_stealth_perm_enum) +
+- :material-account:{ .lg .middle } __Original Research__ + + --- + + + +- :material-tools:{ .lg .middle } __Tools mentioned in this article__ + + --- + + [aws_stealth_perm_enum](https://github.com/Frichetten/aws_stealth_perm_enum) +
!!! Warning As of 5/18/2021, this technique has been resolved and fixed by AWS. Mutating the Content-Type header when making API requests no longer can be used to enumerate permissions of a role or user. This page is maintained for historical and inspiration purposes.