3.2 KiB
AWS - DynamoDB Privesc
{% hint style="success" %}
Learn & practice AWS Hacking:
HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking:
HackTricks Training GCP Red Team Expert (GRTE)
Support HackTricks
- Check the subscription plans!
- Join the 💬 Discord group or the telegram group or follow us on Twitter 🐦 @hacktricks_live.
- Share hacking tricks by submitting PRs to the HackTricks and HackTricks Cloud github repos.
dynamodb
For more info about dynamodb check:
{% content-ref url="../aws-services/aws-dynamodb-enum.md" %} aws-dynamodb-enum.md {% endcontent-ref %}
Post Exploitation
As far as I know there is no direct way to escalate privileges in AWS just by having some AWS dynamodb permissions. You can read sensitive information from the tables (which could contain AWS credentials) and write information on the tables (which could trigger other vulnerabilities, like lambda code injections...) but all these options are already considered in the DynamoDB Post Exploitation page:
{% content-ref url="../aws-post-exploitation/aws-dynamodb-post-exploitation.md" %} aws-dynamodb-post-exploitation.md {% endcontent-ref %}
TODO: Read data abusing data Streams
{% hint style="success" %}
Learn & practice AWS Hacking:
HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking:
HackTricks Training GCP Red Team Expert (GRTE)
Support HackTricks
- Check the subscription plans!
- Join the 💬 Discord group or the telegram group or follow us on Twitter 🐦 @hacktricks_live.
- Share hacking tricks by submitting PRs to the HackTricks and HackTricks Cloud github repos.