Skip to content

Latest commit

 

History

History
47 lines (30 loc) · 3.11 KB

File metadata and controls

47 lines (30 loc) · 3.11 KB

AWS - DynamoDB Privesc

Learn AWS hacking from zero to hero with htARTE (HackTricks AWS Red Team Expert)!

Other ways to support HackTricks:

dynamodb

For more info about dynamodb check:

{% content-ref url="../aws-services/aws-databases/aws-dynamodb-enum.md" %} aws-dynamodb-enum.md {% endcontent-ref %}

Post Exploitation

As far as I know there is no direct way to escalate privileges in AWS just by having some AWS dynamodb permissions. You can read sensitive information from the tables (which could contain AWS credentials) and write information on the tables (which could trigger other vulnerabilities, like lambda code injections...) but all these options are already considered in the DynamoDB Post Exploitation page:

{% content-ref url="../aws-post-exploitation/aws-dynamodb-post-exploitation.md" %} aws-dynamodb-post-exploitation.md {% endcontent-ref %}

TODO: Read data abusing data Streams

Learn AWS hacking from zero to hero with htARTE (HackTricks AWS Red Team Expert)!

Other ways to support HackTricks: