Skip to content

Conversation

@TheToddLuci0
Copy link
Contributor

Add some info on using the default configuration of the AWS CDK to compromise an account. The privesc section explains how to abuse the default configuration to assume roles with predictable names to deploy arbitrary CFN templates, as well as an example of how to compromise an account by editing an IAC config. The persistence section (new page) describes how the default bootstrap stack can be modified to enable an attacker to maintain access.

I put it in the cloudformation section, since it uses that behind the scenes, however if it should be in it's own section I have no issues moving it.

@carlospolop
Copy link
Collaborator

Nice one @TheToddLuci0, thanks for sharing!

@carlospolop carlospolop merged commit a26a1b6 into HackTricks-wiki:master Apr 7, 2025
github-actions bot pushed a commit that referenced this pull request Aug 29, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants