Principal Detection and Response Analyst at @expel_io. Statements are my own.
May 19, 2020 • 6 tweets • 2 min read
Many target AWS from afar, but this #redteam played the long game:
1. Physical access to a laptop via a retail store 2. Persisted via a @Raspberry_Pi under a table 3. Lat. movement via SSH through OSX 4. Recon via Bash history 5. Used stolen .boto to access AWS
👇Thread 👇 1. Lock your laptops! Lower the password timeout window so your users don't have to think about it. With this access the red team was able to gain not only their initial access, but credentials they could use to SSH to several machines across the org.