IAM Privilege Escalation

Put your understanding of IAM to practice by covering key concepts required to enumerate, exploit and persist across IAM.
IAM underpins the entire permission and access model across various AWS services and identities. Attackers heavily target IAM-based components to gain access, escalate privileges and maintain persistence in AWS environments. Get hands-on experience with how attackers utilise IAM at each stage of the attack chain to reach their objectives.

0%
AWS IAM Initial Access
Gaining Initial Access to AWS IAM Principals.
0%
AWS IAM Enumeration
Learn enumerating IAM Principals and implemented services.
What are modules?
A learning pathway is made up of modules, and a module is made of bite-sized rooms (think of a room like a mini security lab).
