Amazon Web Services (AWS)
Situational Awareness
Detect virtual environment
lsns
hostnamectl
systemd-detect-virt
Useful Tools
- docker binary - statically compiled docker binary
- capsh - container capability enumeration
capsh --print - sysdig - Container monitoring solution. Reports container actions/activities to the cloud.
- ttyd - run a tty session via server and get access in a browser
- pmapper
- pacu
Enumerating Accounts
- AWS Policy Evaluation Logic
- By adding an account # to your IAM Roles Trust Policy you can verify an accounts existence (same with users & roles in accounts)
- Account IDs can be used as the starting point for enumerating accounts
rootuser will always be there
TOKEN=`curl -X PUT -H "X-aws-ec2-metadata-token-ttl-seconds: 21600" "http://169.254.169.254/latest/api/token" `
curl -H "X-aws-ec2-metadata-token: $TOKEN" -v http://169.254.169.254/latest/meta-data/
References
- [Cloudshark)(https://www.cloudshark.org/captures/ff740838f1c2)