diff --git a/src/pentesting-cloud/aws-security/aws-post-exploitation/aws-sts-post-exploitation/README.md b/src/pentesting-cloud/aws-security/aws-post-exploitation/aws-sts-post-exploitation/README.md index 4714c3929..720e15f6a 100644 --- a/src/pentesting-cloud/aws-security/aws-post-exploitation/aws-sts-post-exploitation/README.md +++ b/src/pentesting-cloud/aws-security/aws-post-exploitation/aws-sts-post-exploitation/README.md @@ -83,6 +83,10 @@ aws-vault login jonsmith # Open a browser logged as jonsmith > [!NOTE] > You can also use **aws-vault** to obtain an **browser console session** +### From Web Console to IAM Creds + +The browser extension **** is capable of intercepting from the network IAM credentials before they are protected in the memory of the browser. + ### **Bypass User-Agent restrictions from Python** If there is a **restriction to perform certain actions based on the user agent** used (like restricting the use of python boto3 library based on the user agent) it's possible to use the previous technique to **connect to the web console via a browser**, or you could directly **modify the boto3 user-agent** by doing: