Files
hacktricks-cloud/pentesting-cloud/aws-security/aws-post-exploitation/aws-control-tower-post-exploitation.md
2024-12-12 19:35:48 +01:00

3.0 KiB

AWS - Control Tower Post Exploitation

{% hint style="success" %} Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)

Support HackTricks
{% endhint %}

Control Tower

{% content-ref url="../aws-services/aws-security-and-detection-services/aws-control-tower-enum.md" %} aws-control-tower-enum.md {% endcontent-ref %}

Enable / Disable Controls

To further exploit an account, you might need to disable/enable Control Tower controls:

{% code overflow="wrap" %}

aws controltower disable-control --control-identifier <arn_control_id> --target-identifier <arn_account>
aws controltower enable-control --control-identifier <arn_control_id> --target-identifier <arn_account>

{% endcode %}

{% hint style="success" %} Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)

Support HackTricks
{% endhint %}