AKIBA.AWS #10 Developers.IOæ±äº¬ åå¤ç¥ï¼AWS Update LT大ä¼ã®è³æã§ãã AWS使ã£ã¦ãã°ã»ãã¥ãªãã£ã¯å®å¿ï¼ ãã¡ãã¨ç解ãã¦AWSã§ãã»ãã¥ãªãã£å¯¾çãã¾ãããã #akibaaws
AKIBA.AWS #10 Developers.IOæ±äº¬ åå¤ç¥ï¼AWS Update LT大ä¼ã®è³æã§ãã AWS使ã£ã¦ãã°ã»ãã¥ãªãã£ã¯å®å¿ï¼ ãã¡ãã¨ç解ãã¦AWSã§ãã»ãã¥ãªãã£å¯¾çãã¾ãããã #akibaaws
Disclaimer: As always, use Pacu and similar AWS pentesting tools responsibly. Only test against your own AWS accounts, or those you are authorized for. Amazon Web Services (AWS) IAM roles are sets of permissions that serve as a common way to delegate access to users or services. Roles can be bestowed to internal and external IAM users, AWS services, applications, and even external user accounts ou
ãä¹ ãã¶ãã§ããã²ãããã§ãã åã ããæ°ã«ãªã£ã¦ããAWS EC2ã®169.254.169.254ã«ã¤ãã¦å°ãéãã§ã¿ãã®ã§ã¾ã¨ãã¾ãã EC2ã§ã¯ãã¤ã³ã¹ã¿ã³ã¹å ãã http://169.254.169.254/ ã«ã¢ã¯ã»ã¹ããã¨ããã®ã¤ã³ã¹ã¿ã³ã¹ã«é¢ããæ å ±ãåå¾ã§ããããã«ãªã£ã¦ãã¾ãã docs.aws.amazon.com ãã¾ãæèãããã¨ã¯ãªãããããã¾ããããã¤ã³ã¹ã¿ã³ã¹ã«IAMãã¼ã«ãçµã³ä»ããç¶æ ã§AWS CLIã使ãã¨å é¨çã«ãã®169ã®URLãå©ãããä»çµã¿ã«ãªã£ã¦ãã¾ãã ããã¯ã¤ã³ã¹ã¿ã³ã¹å ã§--debugãªãã·ã§ã³ã使ã£ã¦AWS CLIãå®è¡ããã¨ãããã¨æãã¾ãã [ec2-user@ip-172-31-30-197 ~]$ aws s3 ls --debug ï½ï½ï½ 2018-09-03 11:11:33,898 - MainThread - boto
ãªãªã¼ã¹ãé害æ å ±ãªã©ã®ãµã¼ãã¹ã®ãç¥ãã
ææ°ã®äººæ°ã¨ã³ããªã¼ã®é ä¿¡
å¦çãå®è¡ä¸ã§ã
j次ã®ããã¯ãã¼ã¯
kåã®ããã¯ãã¼ã¯
lãã¨ã§èªã
eã³ã¡ã³ãä¸è¦§ãéã
oãã¼ã¸ãéã
{{#tags}}- {{label}}
{{/tags}}