Learn AWS hacking from zero to hero with htARTE (HackTricks AWS Red Team Expert)!
Other ways to support HackTricks:
- If you want to see your company advertised in HackTricks or download HackTricks in PDF Check the SUBSCRIPTION PLANS!
- Get the official PEASS & HackTricks swag
- Discover The PEASS Family, our collection of exclusive NFTs
- Join the 💬 Discord group or the telegram group or follow us on Twitter 🐦 @hacktricks_live.
- Share your hacking tricks by submitting PRs to the HackTricks and HackTricks Cloud github repos.
For more info about dynamodb check:
{% content-ref url="../aws-services/aws-databases/aws-dynamodb-enum.md" %} aws-dynamodb-enum.md {% endcontent-ref %}
As far as I know there is no direct way to escalate privileges in AWS just by having some AWS dynamodb
permissions. You can read sensitive information from the tables (which could contain AWS credentials) and write information on the tables (which could trigger other vulnerabilities, like lambda code injections...) but all these options are already considered in the DynamoDB Post Exploitation page:
{% content-ref url="../aws-post-exploitation/aws-dynamodb-post-exploitation.md" %} aws-dynamodb-post-exploitation.md {% endcontent-ref %}
Learn AWS hacking from zero to hero with htARTE (HackTricks AWS Red Team Expert)!
Other ways to support HackTricks:
- If you want to see your company advertised in HackTricks or download HackTricks in PDF Check the SUBSCRIPTION PLANS!
- Get the official PEASS & HackTricks swag
- Discover The PEASS Family, our collection of exclusive NFTs
- Join the 💬 Discord group or the telegram group or follow us on Twitter 🐦 @hacktricks_live.
- Share your hacking tricks by submitting PRs to the HackTricks and HackTricks Cloud github repos.