Phase 5 · Exfiltration
ACTIVE AWS SESSION
OrganizationAccountAdmin
arn:aws:sts::448291:assumed-role/OrganizationAccountAdmin/red-team-pivot
ALL ACCESS
AWS Resources · S3 · RDS · Secrets Manager
Idle
0 MB / 2.4 GB
0 / 7 resources stolen
Attacker S3 Bucket
s3://red-team-loot-9af2
Click any AWS resource to siphon it with the OrgAdmin session, or run a full smash-and-grab.