- 1、本文档共6页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
- 5、该文档为VIP文档,如果想要下载,成为VIP会员后,下载免费。
- 6、成为VIP后,下载本文档将扣除1次下载权益。下载后,不支持退款、换文档。如有疑问请联系我们。
- 7、成为VIP后,您将拥有八大权益,权益包括:VIP文档下载权益、阅读免打扰、文档格式转换、高级专利检索、专属身份标志、高级客服、多端互通、版权登记。
- 8、VIP文档为合作方或网友上传,每下载1次, 网站将根据用户上传文档的质量评分、类型等,对文档贡献者给予高额补贴、流量扶持。如果你也想贡献VIP文档。上传文档
查看更多
Pivoting in Amazon Clouds
Introduction
Mission critical applications are being deployed to the Amazon cloud and most information security experts
have no clue about what needs to be inspected to make sure they are secure.
As we’ll learn from this research, classic security testing is not enough, knowledge about Amazon’s EC2
instance lifecycle, userdata, IAM roles, and other Amazon cloud services are required when testing and
exploiting Amazon cloud architectures.
Tools and PoC code will be released as part of this research. The tools, written in Python using the boto
library, provide the following features:
Enumerate access to AWS services for current IAM role
Use poorly configured IAM role to create new AWS user
Extract current AWS credentials from metadata, .boto.cfg, environment variables, etc.
Clone DB to access information stored in snapshot
Inject raw Celery task for pickle attack
Instance metadata
All EC2 instances have metadata, such as the used AMI, kernel and region. This metadata is made available
to the instance through a web server (only accessible to that particular instance) which lives at
54/ . Amazon’s metadata documentation better explains all the details about the instance
metadata and how to access it.
From the information security perspective the important information available in the metadata is:
Local IP Address
Userdata
Instance profile: AWS API credentials as explained in Instance profiles
Amazon Machine Images (AMI)
When creating a new EC2 instance, or defining a launch configuration which will be used together with auto
scaling groups, the AWS administrator can provide a script which will be run by the EC2 instance operating
system as one of the last boot steps. This script, also called user data, is stored by AWS in the instance meta
data and retrieved by the OS during boot. In Ubuntu t
您可能关注的文档
- BlackHat资料us-14-Larsen-Miniturization-WP.pdf
- BlackHat资料us-14-Li-APT-Attribution-And-DNS-Profiling-WP.pdf
- BlackHat资料us-14-Lindh-Attacking-Mobile-Broadband-Modems-Like-A-Criminal-Would.pdf
- BlackHat资料us-14-Lindh-Attacking-Mobile-Broadband-Modems-Like-A-Criminal-Would-WP.pdf
- BlackHat资料us-14-Luft-When-The-Lights-Go-Out-Hacking-Cisco-EnergyWise.pdf
- BlackHat资料us-14-Luders-Why-Control-System-Cyber-Security-Sucks.pdf
- BlackHat资料us-14-Luft-When-The-Lights-Go-Out-Hacking-Cisco-EnergyWise-WP.pdf
- BlackHat资料us-14-Mahjoub-Catching-Malware-En-Masse-DNS-And-IP-Style-WP.pdf
- BlackHat资料us-14-Mateski-The-Devil-Does-Not-Exist-The-Role-Of-Deception-In-Cyber.pdf
- BlackHat资料us-14-Mayer-Time-Trial-Racing-Towards-Practical-Timing-Attackss.pdf
最近下载
- 统编版六年级语文上册习作《多彩的活动》精品课件(共84张PPT).pptx VIP
- 电厂2×600MW机组扩建工程建筑及安装工程土建专业主要技术施工方案.docx VIP
- 电厂2×600MW扩建(脱硫土建、安装)工程土建专业主要施工技术方案.docx VIP
- 电厂2×600MW机组扩建工程建筑及安装锅炉专业施工技术方案.docx VIP
- 煤电公司2×600MW机组工程汽机专业主要施工技术方案.pdf VIP
- 2X660MW超超临界燃煤机组工程qtz2500型塔式起重机安装的施工方案.doc VIP
- 2X660MW超超临界燃煤机组工程#2锅炉平台楼梯安装方案全案(终版).doc VIP
- 2X660MW超超临界燃煤机组工程#2锅炉平台楼梯安装的方案.doc VIP
- 电厂(2×660MW超超临界机组)机组安装工程锅炉专业施工方案.docx VIP
- 电厂(2×660MW超超临界机组)机组安装工程汽机专业施工方案.docx VIP
文档评论(0)