AWS RDS Enumeration
Databases and their corresponding ports:
1) Amazon Aurora (port 3306)
2) PostgreSQL (5432)
3) MySQL (port 3306)
4) MariaDB (port 3306)
5) Oracle Database (port 1521)
6) SQL Server (port 1433)
Database discovery
sudo nmap -Pn -p3306,5432,1433,1521 RDS_INSTANCE_NAME.RDS_INSTANCE_ID.REGION.rds.amazonaws.comBruteforce for credentials
Wordlist used in this example: https://raw.githubusercontent.com/danielmiessler/SecLists/master/Passwords/Default-Credentials/mysql-betterdefaultpasslist.txt
nmap -Pn -p3306 --script=mysql-brute --script-args brute.delay=10,brute.mode=creds,brute.credfile=mysql-creds.txt RDS_INSTANCE_NAME.RDS_INSTANCE_ID.REGION.rds.amazonaws.comUpon login, we can further confirm that we are dealing with an AWS RDS Instance
Commands:
1) Listing information about clusters in RDS
2) Listing information about RDS instances
3) Look for public RDS Instance Snapshots
4) Look for public RDS Database Cluster Instances
If: IAMDatabaseAuthenticationEnabled: false -> Need password to access the instance
5) Listing information about subnet groups in RDS
6) Listing information about database security groups in RDS
7) Listing information about database proxies
Last updated