![Exploiting fine-grained AWS IAM permissions for total cloud compromise: a real world example (part 2/2) | by Security Shenanigans | InfoSec Write-ups Exploiting fine-grained AWS IAM permissions for total cloud compromise: a real world example (part 2/2) | by Security Shenanigans | InfoSec Write-ups](https://miro.medium.com/max/1400/1*DDwlUWb3zpuft9n8kWSGbA.png)
Exploiting fine-grained AWS IAM permissions for total cloud compromise: a real world example (part 2/2) | by Security Shenanigans | InfoSec Write-ups
![Screenshot of Amazon EC2 Management Console showing the running instances. | Download Scientific Diagram Screenshot of Amazon EC2 Management Console showing the running instances. | Download Scientific Diagram](https://www.researchgate.net/profile/Vedang-Shah-2/publication/301443552/figure/fig3/AS:724329746665474@1549705077433/Screenshot-of-Amazon-EC2-Management-Console-showing-the-running-instances_Q640.jpg)
Screenshot of Amazon EC2 Management Console showing the running instances. | Download Scientific Diagram
Screenshot of Amazon EC2 Management Console showing the running instances. | Download Scientific Diagram
![Remotely run commands on multiple EC2 Instances using AWS SSM Agent(Without SSH/Bastion Host) | by Aniket Patel | Towards AWS Remotely run commands on multiple EC2 Instances using AWS SSM Agent(Without SSH/Bastion Host) | by Aniket Patel | Towards AWS](https://miro.medium.com/max/1362/1*slUjZgkyI3wYLukGUBAYrQ.png)