My recent #aws threads always startet with creds, but how to get these creds will be the topic over the next days.
#hacking #recon #cloud

Lets start here:
👇
Definitions first:
#aws creds: classic name and passwords e.g for IAM, or aws access and secret keys
Outside: no creds, and no connections in any way to the org and its aws cloud to be tested
Interaction Point: Any potential point, application ressource, system, vulnerabilty etc, where there is a pawsibilty to gain #aws creds, can be a lot of things

lets do outside first: #hackers are cold, let them in.
Two things from outside:
1. Search for #aws creds leak
2. Identify and if possible abuse interaction points to gain #aws creds (future thread)

Leak search now, interactions points in a future thread
Basically ANYTHING puplic where #aws creds were mistakenly posted.
Stuff like:
Anything git, github, gitlab etc
Any share-stuff
Any api-collections
Any stuff on developer plattforms
Anything you can find really
Some already well known tools for this
buckets.grayhatwarfare.com/buckets
zoomeye.org
github.com/tillson/git-ho…
and a lot more tools like these ....
TBH its not as easy to find creds as it used to be, creds are flagged, scanned for by orgs themselfes or contracters etc.
Selfhosted git or share-thingies sometimes still might be good tho, but don't expect to find #aws creds in pup git easily.
Sidenote: I purrsonaly am often more interested in terraform or cloudformation confs, even if they has no key, is super valuable information, about system arch, and interaction points. I yearn for the yaml! scream meme cat yearns for yaml files, to abuse security gro
Sidenote: The last key I found from pure outside was not in repo but in commit-history, check those.
Also: Of course there is also darknet, markets, forums and payed-leaks, but these are for another time.
As always in reality all is more complex. Imagine you have rdp in an org, even tho you are technically inside, you have no cloud creds, so INSIDE is OUTSIDE meow! ginger cat in window, upside down, cute and illustrates the
Do the same, look for share, git, scripts, jobs etc. all of it. Inside might not be auto scanning/tagging for #aws keys. Recent example the #uber hack, White found a script, then pam, then cloud creds:
Don't tunnelvision on ad 2 much fellows. screenshot from white, where he found creds in script to clo
Next up Interaction points, general stuff and technical examples. And yes you can support me by sending me cute animals and illegaly dirty techno.

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with gatitohacs 😼

gatitohacs 😼 Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @rootcathacking

Mar 14
You, hey you, yeah you; wann learn a bit about aws elastic compute hacking?

Just, me, you and an EC2

👇 little hacker otter asks yo...
An ec2 can be considered an interaction point, where it is possible to gain entry into aws of an org. This is a continuation of yesterdays thread:
Imagine: You find yourself in ec2, via some vulnerability, leaked ssh key, account or whatever.
Your are now just in a virtual machine, even tho this machine is hosted in aws, at this moment you have no connection into aws cloud of the org.
So lets make one
Read 12 tweets
Mar 2
I pet a cat today and now my allergies are killing me, so obviously this calls for a follow up of, hey you found some #aws creds, what to do meow:

#cloud #hacking #Recon
👇
Step 1: First you gotta decide if this is more of a lazy space vibe kinda thing (A), or (B) calls for some illegal dirty acidcore and adjust your playlist accordingly:
A:
B: soundcloud.com/pitch1/i-can-h…
next drop the keys in your .aws creds file. I typically name the first set initial and work with the --profile tag in the cli, so I can keep track on were I am. Then check who you are first, with:
aws sts get-caller-identity --profile initial
Read 11 tweets
Mar 1
So you found #aws creds to an S3, lets do some #cloud #hacking #recon:

👇
First of all, S3 stands for serious summertime sadness
and allows the general operations of:

list
get
put
delete

An S3 is a bucket and within a bucket there are objects. Basically an object can be anyfile. Objects have keys assoziated
and a bucket nayme must be globally unique and not contain spaces or uppercase letters.
Example:
mrlee.s3.us-west-2.amazonaws.com/mafia/pizza.jpg

the bucket mrlee in the west region with an object pizza.jpg and a key of /mafia/pizza.jpg
Read 10 tweets
Feb 28
So you wanna do some #azure #recon:

I give you a few pointers.
👇
Step 1: Say kiitos to @DrAzureAD then install AADInternals, set your phasers to stun and your POWAHSHELL to german to ensure MAXIMUM efficiency german powershell screenshot
To import the modul you might have to set your execution pawliciy 🐾.
For maximum fun we can set this to
Set-ExecutionPolicy unrestricted
on our managed company super safe devices. Do some privesc first if needed 😀
Read 9 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us on Twitter!

:(