Skip to content

Commit 80f8c6d

Browse files
authored
Update aws-ecs-privesc.md
1 parent 279156a commit 80f8c6d

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

src/pentesting-cloud/aws-security/aws-privilege-escalation/aws-ecs-privesc.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -199,7 +199,7 @@ aws ecs run-task \
199199

200200
This scenario is like the previous ones but **without** the **`iam:PassRole`** permission.\
201201
This is still interesting because if you can run an arbitrary container, even if it's without a role, you could **run a privileged container to escape** to the node and **steal the EC2 IAM role** and the **other ECS containers roles** running in the node.\
202-
You could even **force other tasks to run inside the EC2 instance** you compromise to steal their credentials (as discussed in the [**Privesc to node section**](../Job/aws-ecs-privesc.md#privesc-to-node)).
202+
You could even **force other tasks to run inside the EC2 instance** you compromise to steal their credentials (as discussed in the [**Privesc to node section**](aws-ecs-post-exploitation.md#privesc-to-node)).
203203

204204
> [!WARNING]
205205
> This attack is only possible if the **ECS cluster is using EC2** instances and not Fargate.

0 commit comments

Comments
 (0)