Skip to content

Commit 590e54e

Browse files
committed
stsgetfederatedtoken
1 parent e153dc4 commit 590e54e

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

src/pentesting-cloud/aws-security/aws-post-exploitation/aws-sts-post-exploitation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -110,7 +110,7 @@ aws sts get-federation-token --name <username>
110110

111111
The token returned by sts:GetFederationToken belongs to the federated identity of the calling user, but with restricted permissions. Even if the user has administrator rights, certain actions such as listing IAM users or attaching policies cannot be performed through the federated token.
112112

113-
Additionally, this method is somewhat more stealthy, since the federated user does not appear in the AWS console (IAM portal), it can only be observed through CloudTrail logs or monitoring tools.
113+
Additionally, this method is somewhat more stealthy, since the federated user does not appear in the AWS Portal, it can only be observed through CloudTrail logs or monitoring tools.
114114

115115
{{#include ../../../banners/hacktricks-training.md}}
116116

0 commit comments

Comments
 (0)