-
-
Save MorikoHandford/d53510c4df10cf9a9f8a to your computer and use it in GitHub Desktop.
Find an AWS IAM user corresponding to an AWS Access Key
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
# Find the IAM username belonging to the args.key | |
# Useful for finding IAM user corresponding to a compromised AWS credential | |
# Requirements: | |
# | |
# Environmental variables: | |
# AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY | |
# python: | |
# boto, argparse | |
import boto.iam, argparse | |
p = argparse.ArgumentParser(description="Searches for an IAM key.") | |
p.add_argument('--key', action='store', default=None, dest='key', help='Which key to search for', required=True) | |
args = p.parse_args() | |
iam = boto.connect_iam() | |
users = iam.get_all_users('/')['list_users_response']['list_users_result']['users'] | |
def find_key(): | |
for user in users: | |
for key_result in iam.get_all_access_keys(user['user_name'])['list_access_keys_response']['list_access_keys_result']['access_key_metadata']: | |
aws_access_key = key_result['access_key_id'] | |
if aws_access_key == args.key: | |
print 'Target key belongs to:' | |
print 'user : ' + user['user_name'] | |
return True | |
return False | |
if not find_key(): | |
print 'Did not find access key (' + args.key + ') in ' + str(len(users)) + ' IAM users. Maybe it is from another AWS account!' |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment