iam:PassRole, codestar:CreateProject
Last updated
Last updated
Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE) Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)
With these permissions you can tumia codestar IAM Role kufanya vitendo vya kiholela kupitia cloudformation template.
To exploit this you need to create a S3 bucket ambayo inapatikana kutoka kwa akaunti iliyoshambuliwa. Upload a file called toolchain.json
. This file should contain the cloudformation template exploit. The following one can be used to set a managed policy to a user under your control and give it admin permissions:
Pia pakia faili hili la empty zip
kwenye bucket:
Kumbuka kwamba bucket yenye faili zote mbili inapaswa kufikiwa na akaunti ya mwathirika.
Kwa vitu vyote viwili kupakiwa sasa unaweza kuendelea na exploitation kwa kuunda mradi wa codestar:
Hii exploit inategemea Pacu exploit ya haki hizi: https://github.com/RhinoSecurityLabs/pacu/blob/2a0ce01f075541f7ccd9c44fcfc967cad994f9c9/pacu/modules/iam__privesc_scan/main.py#L1997 Juu yake unaweza kupata toleo la kuunda sera ya usimamizi wa admin kwa jukumu badala ya kwa mtumiaji.
Jifunze & fanya mazoezi ya AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE) Jifunze & fanya mazoezi ya GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)