Credential Exfiltration

Scenario 3: IAM Role Credential Exfiltration

Contents

  1. Manually Create Findings
  2. IAM Role Credential Exfiltration