首页
社区
课程
招聘
[原创]无所遁形:探索云安全渗透的最新趋势与前沿工具
发表于: 2023-5-26 00:24 5726

[原创]无所遁形:探索云安全渗透的最新趋势与前沿工具

2023-5-26 00:24
5726

云安全 – 攻击

AWS

在 AWS VPN 客户端中将权限升级为 SYSTEM

  • c6fK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6J5K9r3W2F1L8%4y4W2j5%4g2J5K9i4c8&6L8r3q4T1M7#2)9J5k6h3y4G2L8g2)9J5c8X3q4%4M7#2)9J5c8X3y4$3k6g2)9J5k6o6t1H3x3U0u0Q4x3X3b7J5y4e0p5$3y4g2)9J5k6r3q4%4M7#2)9J5k6s2k6H3L8W2)9J5k6r3y4D9K9h3g2F1N6q4)9J5c8R3`.`.

AWS WorkSpaces 远程代码执行

CloudFormation 模板中的资源注入

下载和探索 AWS EBS 快照

  • a83K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6J5K9r3W2F1L8%4y4W2j5%4g2J5K9i4c8&6L8r3q4T1M7#2)9J5k6h3y4G2L8g2)9J5c8X3q4%4M7#2)9J5c8X3g2^5M7r3I4G2M7X3W2F1k6#2)9J5k6r3q4%4M7#2)9J5k6r3g2T1M7#2)9J5k6s2y4F1j5i4m8K6K9r3!0@1M7#2)9J5c8R3`.`.

CloudGoat ECS_EFS_Attack 演练

GKE Kubelet TLS Bootstrap 提权

武器化 AWS ECS 任务定义以窃取正在运行的容器中的凭证

CloudGoat AWS 场景演练:“EC2_SSRF”

掠夺硬编码机密的 AWS ECS 任务定义

在 AWS 中滥用 VPC 流量镜像

  • 244K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6J5K9r3W2F1L8%4y4W2j5%4g2J5K9i4c8&6L8r3q4T1M7#2)9J5k6h3y4G2L8g2)9J5c8X3q4%4M7#2)9J5c8X3q4T1N6i4y4A6L8X3N6Q4x3X3c8$3M7r3y4Q4x3X3c8@1M7X3q4X3k6X3W2U0i4K6u0V1L8h3W2J5M7X3!0J5K9h3&6Y4i4K6u0V1K9h3&6Q4x3X3c8S2N6%4y4Q4x3V1j5`.

使用云容器攻击工具 (CCAT) 利用 AWS ECR 和 ECS

  • c67K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6J5K9r3W2F1L8%4y4W2j5%4g2J5K9i4c8&6L8r3q4T1M7#2)9J5k6h3y4G2L8g2)9J5c8X3q4%4M7#2)9J5c8X3y4D9L8%4g2V1i4K6u0V1j5$3!0F1N6r3q4A6L8X3g2J5i4K6u0V1j5i4c8@1j5h3y4C8i4K6u0V1N6r3!0G2L8q4)9J5c8R3`.`.

使用 AWS API Gateway 绕过基于 IP 的封锁

  • 140K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6J5K9r3W2F1L8%4y4W2j5%4g2J5K9i4c8&6L8r3q4T1M7#2)9J5k6h3y4G2L8g2)9J5c8X3q4%4M7#2)9J5c8X3u0&6M7r3q4K6M7$3W2F1k6#2)9J5k6r3W2H3i4K6u0V1j5X3q4K6k6h3c8Q4x3X3c8T1L8r3!0U0K9$3W2F1k6#2)9J5k6r3q4%4M7#2)9J5c8R3`.`.

在 AWS 上使用 MFA 钓鱼用户

  • 2caK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6J5K9r3W2F1L8%4y4W2j5%4g2J5K9i4c8&6L8r3q4T1M7#2)9J5k6h3y4G2L8g2)9J5c8X3q4%4M7#2)9J5c8X3#2X3j5g2)9J5k6s2m8Z5K9i4y4Z5K9h3&6Y4i4K6u0V1L8$3&6Q4x3X3c8S2N6%4y4Q4x3V1j5`.

AWS IAM 特权升级 – 方法和缓解措施

渗透测试 AWS 存储:踢 S3 存储桶

云安全风险 (P2):AWS CloudTrail 中的 CSV 注入

亚马逊的 AWS 配置错误:在 Amazon Go 中上传任意文件

权限升级攻击:攻击 AWS IAM 权限错误配置

  • 9b4K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6H3j5i4W2S2N6s2g2Q4x3X3g2U0L8$3#2Q4x3V1k6T1L8r3!0Y4i4K6u0r3L8h3q4&6j5h3&6C8i4K6u0W2j5i4u0G2M7X3q4Q4x3V1k6A6j5h3#2Q4y4h3k6H3M7X3W2$3K9h3I4W2k6$3g2Q4y4h3k6W2M7$3y4S2L8r3q4@1K9h3!0F1i4K6g2X3j5i4c8@1j5h3y4C8

IAM 易受攻击 – AWS IAM 特权升级游乐场

  • 95dK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6T1K9i4y4Z5L8%4m8X3L8%4S2Q4x3X3g2U0L8$3#2Q4x3V1k6T1L8r3!0Y4i4K6u0r3j5i4N6K6i4K6u0V1K9h3q4E0i4K6u0V1M7s2u0A6N6X3W2D9k6h3N6W2i4K6u0V1k6i4y4U0j5h3I4S2N6r3W2G2L8W2)9J5k6s2m8D9j5i4W2Y4M7X3!0#2L8X3b7`.

通往云的自动扶梯:AWS 中的 5 个 Privesc 攻击向量

  • 3cdK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6T1K9i4y4Z5L8%4m8X3L8%4S2Q4x3X3g2U0L8$3#2Q4x3V1k6T1L8r3!0Y4i4K6u0r3y4g2)9J5k6s2m8J5K9i4k6W2M7$3y4Q4x3X3c8S2N6s2c8S2j5$3E0Q4x3X3c8$3k6h3y4@1L8%4u0K6i4K6u0V1K9h3&6Q4x3X3c8S2N6%4x3`.

易受攻击的 AWS Lambda 函数——云攻击中的初始访问

  • b5cK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6K6P5i4y4V1K9h3N6Q4x3X3g2U0L8$3#2Q4x3V1k6T1L8r3!0Y4i4K6u0r3k6i4S2H3L8r3!0A6N6q4)9J5k6r3#2A6N6r3W2Y4j5i4c8W2i4K6u0V1j5i4N6K6i4K6u0V1L8r3q4E0j5X3c8S2M7#2)9J5k6r3#2A6N6s2u0W2i4K6u0r3

通过 Amazon Web Services 的 EC2 进行特权升级攻击

AWS 攻击

  • 325K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6H3k6h3&6@1k6i4y4@1j5X3!0G2K9#2)9J5k6i4y4A6P5o6u0V1k6i4A6Q4x3X3g2U0L8$3#2Q4x3V1k6W2L8Y4g2E0k6i4u0S2N6r3W2G2L8W2)9J5c8X3y4D9L8%4g2V1i4K6u0r3j5i4N6K6

AWS 影子管理员

通过 API 密钥获得 AWS 控制台访问权限

为 EC2 自动创建 AWS AMI 并复制到其他区域

Instance Connect – 将 SSH 密钥推送到 EC2 实例

黄金 SAML 攻击

从云中的域控制器窃取哈希

AWS PenTest 方法论

CloudGoat 官方攻略系列:“rce_web_app”

  • b0aK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6J5K9r3W2F1L8%4y4W2j5%4g2J5K9i4c8&6L8r3q4T1M7#2)9J5k6h3y4G2L8g2)9J5c8X3q4%4M7#2)9J5c8X3y4D9L8%4g2V1k6$3!0S2N6q4)9J5k6s2N6S2L8r3E0@1K9s2u0G2N6h3N6Z5i4K6u0V1M7X3y4W2i4K6g2X3N6$3g2T1i4K6g2X3j5i4m8H3i4K6u0r3

Azure

GKE Kubelet TLS Bootstrap 提权

云安全风险(第 1 部分):Azure CSV 注入漏洞

SaaS 公司的安全性:利用 Infosec 实现商业价值

常见的 Azure 安全漏洞和错误配置

枚举有效的电子邮件

枚举 Azure 子域

Azure 攻击

  • cfaK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6H3k6h3&6@1k6i4y4@1j5X3!0G2K9#2)9J5k6i4y4A6P5o6u0V1k6i4A6Q4x3X3g2U0L8$3#2Q4x3V1k6W2L8Y4g2E0k6i4u0S2N6r3W2G2L8W2)9J5c8X3y4D9L8%4g2V1i4K6u0r3j5i4A6#2M7X3f1`.

Azure Active Directory 帐户枚举

滥用 Microsoft 的 Azure 域来托管网络钓鱼攻击

防御 EvilGinx2 MFA 绕过

365-Stealer 简介 – 理解和执行非法许可授予攻击

  • 212K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6%4N6%4N6Q4x3X3g2S2L8s2c8W2M7X3g2V1M7$3g2U0N6i4u0A6N6s2W2Q4x3X3g2U0L8$3#2Q4x3V1k6H3L8%4y4@1i4K6u0r3K9h3&6@1M7X3!0V1N6h3y4@1K9h3!0F1i4K6u0V1N6r3!0Q4x3X3b7K6y4U0g2Q4x3X3c8K6N6r3g2S2L8r3g2J5
  • detection-and-mitigation-consent-grant-attacks-azuread/

Azure AD 密码喷洒;从攻击到检测(和预防)。

通过 PASS-THE-PRT 横向移动到云端

Azure AD 通过证书

如何通过 SSH 连接到特定的 Azure Web App 实例

  • a50K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6U0L8$3c8W2P5W2)9J5k6h3c8W2k6h3c8^5i4K6u0W2j5%4A6Q4x3V1k6H3L8%4y4@1M7#2)9J5c8X3S2G2N6#2)9J5k6s2c8G2i4K6u0V1M7%4y4Z5i4K6u0V1K9h3&6@1L8#2)9J5k6s2N6W2j5W2)9J5k6r3q4H3M7q4)9J5k6r3W2F1M7%4c8S2L8X3y4W2i4K6u0r3

攻击 Azure、Azure AD 并介绍 PowerZure

未检测到的 Azure Active Directory 暴力破解攻击

Azure AD 如何容易受到暴力破解和 DOS 攻击

  • 514K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6E0k6h3c8A6N6h3#2Q4x3X3g2U0L8$3#2Q4x3V1k6Z5j5h3y4C8k6i4u0F1L8$3!0F1i4K6u0r3j5i4A6#2M7X3g2Q4x3X3c8T1M7Y4g2@1k6g2)9J5k6r3k6S2M7X3y4W2i4K6u0V1x3e0N6W2x3U0N6V1j5K6l9#2k6U0R3#2

如何在 Azure 和 O365 中绕过 MFA

  • b42K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6K6k6h3y4%4K9i4y4W2i4K6u0W2j5X3g2Q4x3V1k6Z5L8%4N6Q4x3X3c8@1L8#2)9J5k6r3u0&6M7r3q4K6M7#2)9J5k6r3#2X3j5g2)9J5k6r3W2F1i4K6u0V1j5i4A6#2M7X3g2Q4x3X3c8S2L8X3c8Q4x3X3c8G2x3K6j5#2i4K6u0V1M7r3q4J5N6q4)9J5k6o6q4Q4x3V1j5`.

AWS 安全工具

  • github.com/toniblyx/my-arsenal-of-aws-security-tools
  • d74K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Y4K9i4c8Z5N6h3u0Q4x3X3g2U0L8$3#2Q4x3V1k6T1L8r3q4U0K9$3u0G2N6s2y4W2j5%4g2J5K9i4c8&6i4K6u0r3b7g2N6e0i4K6u0V1b7i4c8@1j5h3y4C8
  • c55K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Y4K9i4c8Z5N6h3u0Q4x3X3g2U0L8$3#2Q4x3V1k6S2N6%4y4D9j5h3u0K6i4K6u0r3j5i4N6K6i4K6u0V1j5$3I4G2N6h3c8K6j5h3N6S2
  • b09K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Y4K9i4c8Z5N6h3u0Q4x3X3g2U0L8$3#2Q4x3V1k6S2N6%4y4D9j5h3u0K6i4K6u0r3j5i4N6K6i4K6u0V1M7%4g2H3M7r3!0J5N6q4)9J5k6s2c8G2L8$3I4K6
  • 6c5K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Y4K9i4c8Z5N6h3u0Q4x3X3g2U0L8$3#2Q4x3V1j5H3P5q4k6S2M7X3W2S2j5X3I4W2i4K6u0r3b7g2N6e0i4K6u0V1f1$3g2U0N6i4u0A6N6s2W2Q4x3X3c8f1L8$3!0D9M7H3`.`.
  • 5b1K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6U0P5h3u0W2M7Y4y4W2j5%4g2J5K9i4c8&6N6i4m8Q4x3X3g2Y4K9i4c8Z5N6h3u0Q4x3X3g2A6L8#2)9J5c8X3q4%4M7%4c8J5L8g2)9J5c8X3W2F1k6r3g2^5i4K6u0W2K9s2c8E0L8l9`.`.
  • CloudPentestCheatsheets/blob/master/cheatsheets/AWS.md
  • 940K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Y4K9i4c8Z5N6h3u0Q4x3X3g2U0L8$3#2Q4x3V1k6d9K9r3W2F1L8#2y4W2j5%4g2J5K9i4c8&6e0r3q4T1M7#2)9J5c8X3y4D9L8%4g2V1k6$3!0S2N6l9`.`.

Azure 安全工具

欢迎关注公众号:

 

image-20230525224452467


[培训]科锐逆向工程师培训第53期2025年7月8日开班!

收藏
免费 0
支持
分享
最新回复 (0)
游客
登录 | 注册 方可回帖
返回