Enumeration
Access Control
Who am I?
When logged in remotely using access keys
From Cloudshell
Access Keys
To identify users from a leaked Access Key use the following command
MFA
Users using virtual MFA (TOTP)
List of registered MFA devices
Other Users
Try to get root user from organization information (the username is the same as email for root accounts)
Groups
Roles
Policies
Last updated