Skip to content

Commit df0aaa9

Browse files
committed
clier
1 parent d925f6f commit df0aaa9

1 file changed

Lines changed: 4 additions & 0 deletions

File tree

  • src/pentesting-cloud/aws-security/aws-post-exploitation/aws-sts-post-exploitation

src/pentesting-cloud/aws-security/aws-post-exploitation/aws-sts-post-exploitation/README.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -83,6 +83,10 @@ aws-vault login jonsmith # Open a browser logged as jonsmith
8383
> [!NOTE]
8484
> You can also use **aws-vault** to obtain an **browser console session**
8585
86+
### From Web Console to IAM Creds
87+
88+
The browser extension **<https://github.com/AI-redteam/clier>** is capable of intercepting from the network IAM credentials before they are protected in the memory of the browser.
89+
8690
### **Bypass User-Agent restrictions from Python**
8791

8892
If there is a **restriction to perform certain actions based on the user agent** used (like restricting the use of python boto3 library based on the user agent) it's possible to use the previous technique to **connect to the web console via a browser**, or you could directly **modify the boto3 user-agent** by doing:

0 commit comments

Comments
 (0)