Tuesday, January 31, 2023
HomeCyber SecurityAWS CLI Session Compromise. ACM.145 Risk-modeling AWS assume position… | by Teri...

AWS CLI Session Compromise. ACM.145 Risk-modeling AWS assume position… | by Teri Radichel | Cloud Safety | Jan, 2023


ACM.145 Risk-modeling AWS assume position momentary credentials

  • Within the CLI detailed debug output, as I defined on this submit:
  • Probably to an attacker that has phished an SSO person as defined on this submit:
  • Over the community when requested
  • In reminiscence
  • Cached (saved on disk) on the host that requested them
aws sts get-caller-idenity
/dwelling/ec2-user/.aws/sso/cache
/dwelling/ec2-user/.aws/credentials
/dwelling/ec2-user/.aws/cli/cache
{"Credentials": {"AccessKeyId": "xxxxxx", "SecretAccessKey": "xxxxx", 
"SessionToken": "xxx..." ...
Assist:
Clap
for this story or refer others to observe me.
Observe on Medium: Teri Radichel
Join Electronic mail Checklist: Teri Radichel
Observe on Twitter: @teriradichel
Observe on Mastodon: @teriradichel@infosec.alternate
Observe on Publish: @teriradichel
Like on Fb: 2nd Sight Lab
Purchase a Guide: Teri Radichel on Amazon
Purchase me a espresso:
Teri Radichel
Request companies by way of LinkedIn:
Teri Radichel or via IANS Analysis
About:
Slideshare: Displays by Teri Radichel
Speakerdeck: Displays by Teri Radichel
Recognition: SANS Distinction Makers Award, AWS Hero, IANS College
Certifications: SANS
Schooling: BA Enterprise, Grasp of Sofware Engineering, Grasp of Infosec
How I bought into safety: Lady in tech
Firm (Penetration Exams, Assessments, Coaching): 2nd Sight Lab



RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments