Use the AWS CLI tools to generate a list instances, then pipe them to JQ to show only their launch time and instance id.If you’re able to execute code on these EC2 instances, or even start one yourself with the same instance profile, you meet the criteria for Rhino Security Labs’s AWS Privilege Escalation Method #3! The Execution The instance profile, a set of live EC2 instances. Grepping for the role, an instance profile.