Skip to content

Latest commit

 

History

History
63 lines (40 loc) · 1.81 KB

File metadata and controls

63 lines (40 loc) · 1.81 KB

AWS - Lightsail Enum

{{#include ../../../banners/hacktricks-training.md}}

AWS - Lightsail

Amazon Lightsail provides an easy, lightweight way for new cloud users to take advantage of AWS’ cloud computing services. It allows you to deploy common and custom web services in seconds via VMs (EC2) and containers.
It's a minimal EC2 + Route53 + ECS.

Enumeration

# Instances
aws lightsail get-instances #Get all
aws lightsail get-instance-port-states --instance-name <instance_name> #Get open ports

# Databases
aws lightsail get-relational-databases
aws lightsail get-relational-database-snapshots
aws lightsail get-relational-database-parameters

# Disk & snapshots
aws lightsail get-instance-snapshots
aws lightsail get-disk-snapshots
aws lightsail get-disks

# More
aws lightsail get-load-balancers
aws lightsail get-static-ips
aws lightsail get-key-pairs

Analyse Snapshots

It's possible to generate instance and relational database snapshots from lightsail. Therefore you can check those the same way you can check EC2 snapshots and RDS snapshots.

Metadata

Metadata endpoint is accessible from lightsail, but the machines are running in an AWS account managed by AWS so you don't control what permissions are being granted. However, if you find a way to exploit those you would be directly exploiting AWS.

Privesc

{{#ref}} ../aws-privilege-escalation/aws-lightsail-privesc/README.md {{#endref}}

Post Exploitation

{{#ref}} ../aws-post-exploitation/aws-lightsail-post-exploitation/README.md {{#endref}}

Persistence

{{#ref}} ../aws-persistence/aws-lightsail-persistence/README.md {{#endref}}

{{#include ../../../banners/hacktricks-training.md}}