AWS - RDS Persistence
Reading time: 2 minutes
tip
Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)
Support HackTricks
- Check the subscription plans!
- Join the 💬 Discord group or the telegram group or follow us on Twitter 🐦 @hacktricks_live.
- Share hacking tricks by submitting PRs to the HackTricks and HackTricks Cloud github repos.
RDS
For more information check:
AWS - Relational Database (RDS) Enum
Make instance publicly accessible: rds:ModifyDBInstance
An attacker with this permission can modify an existing RDS instance to enable public accessibility.
bash
aws rds modify-db-instance --db-instance-identifier target-instance --publicly-accessible --apply-immediately
Create an admin user inside the DB
An attacker could just create a user inside the DB so even if the master users password is modified he doesn't lose the access to the database.
Make snapshot public
bash
aws rds modify-db-snapshot-attribute --db-snapshot-identifier <snapshot-name> --attribute-name restore --values-to-add all
tip
Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)
Support HackTricks
- Check the subscription plans!
- Join the 💬 Discord group or the telegram group or follow us on Twitter 🐦 @hacktricks_live.
- Share hacking tricks by submitting PRs to the HackTricks and HackTricks Cloud github repos.