Securing EC2 Instances - Part 2 | S2Ep6 | Security Ramp-Up
In this episode we do a live demo where we will simulate someone gaining access to an EC2 through a vulnerable web application.
Ben Fletcher
Amazon Employee
Published Jul 12, 2024
We successfully used SSRF to grab the credentials from a legacy EC2 that is using IMDSv1. I know, lots acronyms! but all is explained on the show. Essentially we demonstrated lateral movement in an AWS environment, as a result of misconfiguration and over privilege.
Through understanding TTPs (Tactics, Techniques, and Procedures) of threat actors you will be better at articulating and understanding the reasons for configuration choices.
Loading...
Any opinions in this post are those of the individual author and may not reflect the opinions of AWS.