AWS - S3 Persistence

Reading time: 2 minutes

tip

Jifunze na fanya mazoezi ya AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Jifunze na fanya mazoezi ya GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE) Jifunze na fanya mazoezi ya Azure Hacking: HackTricks Training Azure Red Team Expert (AzRTE)

Support HackTricks

S3

Kwa habari zaidi angalia:

AWS - S3, Athena & Glacier Enum

KMS Client-Side Encryption

Wakati the encryption process imemalizika, mtumiaji atatumia KMS API kutengeneza key mpya (aws kms generate-data-key) na ata store the generated encrypted key inside the metadata ya faili (python code example), ili when the decrypting occur iweze ku-decrypt tena kwa kutumia KMS:

Hivyo, attacker anaweza kupata key hii kutoka metadata na ku-decrypt kutumia KMS (aws kms decrypt) kupata key iliyotumika ku-encrypt taarifa. Kwa njia hii attacker atakuwa na encryption key na ikiwa key hiyo itatumiwa tena ku-encrypt faili nyingine ataweza kuitumia.

Using S3 ACLs

Ingawa kwa kawaida ACLs za buckets zimeshizimwa, attacker mwenye privileges za kutosha anaweza kuzibadilisha matumizi yao (ikiwa zimeshawashwa au ikiwa attacker anaweza kuzizima) ili kudumisha access kwa S3 bucket.

tip

Jifunze na fanya mazoezi ya AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Jifunze na fanya mazoezi ya GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE) Jifunze na fanya mazoezi ya Azure Hacking: HackTricks Training Azure Red Team Expert (AzRTE)

Support HackTricks