0% found this document useful (0 votes)
88 views1 page

Offensive AWS Security

This document summarizes the internal and external infrastructure of an AWS cloud environment. It focuses on reviewing AWS configurations, understanding usage and defining boundaries. It identifies risks and recommends security best practices around access policies, governance, documentation, network security controls, encryption, and logging/monitoring. Several open source tools are also listed that can help with offensive security testing, enumeration, and post-exploitation attacks on AWS infrastructure.

Uploaded by

Hank Moody
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
88 views1 page

Offensive AWS Security

This document summarizes the internal and external infrastructure of an AWS cloud environment. It focuses on reviewing AWS configurations, understanding usage and defining boundaries. It identifies risks and recommends security best practices around access policies, governance, documentation, network security controls, encryption, and logging/monitoring. Several open source tools are also listed that can help with offensive security testing, enumeration, and post-exploitation attacks on AWS infrastructure.

Uploaded by

Hank Moody
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

External Infrastructure of your AWS cloud

Application(s) you are hosting/building on


your platform
Focus area

Internal Infrastructure of your AWS cloud

AWS configuration review

Understand AWS usage/implementation

Identify assets & define AWS boundaries WeirdAAL AWS Attack Library

Access policies Pacu AWS penetration testing toolkit

Identify, review & evaluate risks Governance A simple file-based scanner to look for
potential AWS access and secret keys in
Documentation and Inventory Cred Scanner files

A collection of AWS penetration testing


Add AWS to risk assessment
AWS PWN junk

IT security & program policy


A tool for identifying misconfigured
Cloudfrunt CloudFront domains
Network Security Controls
Route53/CloudFront Vulnerability
Physical links Cloudjack Assessment Utility

Granting & revoking accesses Tools for fingerprinting and exploiting


Nimbostratus Amazon cloud infrastructures
Environment Isolation Network Management
GitLeaks Audit git repos for secrets
Documentation and Inventory
Searches through git repositories for high
DDoS layered defence entropy strings and secrets digging deep
TruffleHog into commit history
Malicious code controls
"Tool to search secrets in various filetypes
• Check for misconfigured buckets ( like keys (e.g. AWS Access Key Azure
unauthenticated) DumpsterDiver Share Key or SSH keys) or passwords."

• Once authenticated, check access to S3 Proof of Concept Zappa Based AWS


buckets for sensitive files and data S3 Buckets Mad-King Persistence and Attack Platform

A tool for cleaning up your cloud accounts


• Leverage existing S3 buckets to exfil
Cloud-Nuke by nuking (deleting) all resources within it
data or stage further attacks

The Mozilla Defense Platform (MozDef)


AWS Console access
seeks to automate the security incident
handling process and facilitate the real-
AWS API access
MozDef - The Mozilla Defense Platform time activities of incident handlers.

IPSec Tunnels Encryption Control A bridge between SQLMap and AWS


Lambda which lets you use SQLMap to
SSL Key Mangement natively test AWS Lambda functions for
Tools
Lambda-Proxy SQL Injection vulnerabilities.
Protect PINs at rest

Centralized log storage


Offensive Security Cloud version of the Shadow Copy attack
against domain controllers running in AWS
AWS Guide using only the EC2:CreateSnapshot
Review policies for ‘adequacy’ CloudCopy permission

Concepts Enumerate the permissions associated with


Review Identity and Access Management (
Logging and Monitoring
IAM) credentials report enumerate-iam AWS credential set

Aggregate from multiple sources A post-exploitation framework that allows


you to easily perform attacks on a running
Intrusion detection & response Barq AWS infrastructure

• Analyze code and configuration for Cloud Container Attack Tool (CCAT) is a
sensitive information disclosure tool for testing security of container
CCAT environments
https://www.linkedin.com/in/joas-
• Privilege Escalation through Lambda IAM
Roles and SDK’s Lambda antonio-dos-santos Dufflebag Search exposed EBS volumes for secrets

A tool that allows you to create vulnerable


• Data exfiltration through modification of Joas A Santos instrumented local or cloud environments
data-processing functions
to simulate attacks against and collect the
attack_range data into Splunk
Various methods of trying to evade
detection, cover tracks, and generally stay
Identify hardcoded secrets and dangerous
under the radar
whispers behaviours

• Downloading logs to get a better idea of CloudTrail


Redboto Red Team AWS Scripts
common activity in the environment and
creating a lay of the land A tool to find a company (target)
infrastructure, files, and apps on the top
• Enumerating Instances, Security Groups CloudBrute cloud providers
and AMIs to stage EC2 attacks
Granular, Actionable Adversary Emulation
• Abusing Simple Systems Manager for Stratus Red Team for the Cloud
remote access to instances

EC2/VPC Automated Attack Simulation in the Cloud


• Analyzing EC2 User Data for secrets or Leonidas complete with detection use cases.
system credentials
This script is used to generate some basic
• Identifying routes between VPCs for Amazon Guardduty Tester detections of the GuardDuty service
lateral movement and escalation

Analyze permissions for privilege


escalation paths (through services like
Lambda, EC2, etc.)

• Checking for misconfigured roles,


attempting to access them IAM

• Establish persistence through backdoor


users/roles

Misconfigured topics or queues can allow


unauthorized users to subscribe to topics
or push messages to queues. Testing of
this can be done with the AWS CLI. SNS/SQS

An AWS pentest should determine if the


Cognito configuration is appropriate for
intended application behavior. This
includes checking for self-signups, and
enabling advanced security. Cognito Authentication

You might also like