carnal0wnage / weirdAAL

WeirdAAL (AWS Attack Library)
772 stars 92 forks source link

Added functionality that looks for Roles that are assumable by AWS Principals #58

Closed relotnek closed 5 years ago

relotnek commented 5 years ago

Copied some of the code from list_roles and isolated roles that are assumable by AWS Principals. When sub-accounts are managed by parent entities or when access is provided to an external account, it can be helpful to know in multi-account AWS deployments.

Many of these sub accounts will grant implicit access to an external account allowing any one with sts:assumerole permissions on all resources to leverage the role returned by the output.

This excludes roles that can be assumed by AWS services

carnal0wnage commented 5 years ago

Hey thanks for the PR. we will take a look. It does show a branch conflict. we did some module re-arranging to get ready to add some GCP functionality. you may need to update your folder structure.

cktricky commented 5 years ago

Hey @relotnek thanks for the PR! I believe you might have an old code-base in which you are trying to merge these changes. Can you pull from master and then update this branch accordingly?

Thanks again for submitting!

relotnek commented 5 years ago

you got it, should be set - sorry about that

cktricky commented 5 years ago

No worries! Just happy to have the additional code 😄 🙇