Daily Blog #757: Solution Saturday 2/22/25
文章探讨了AWS IMDS(EC2实例元数据服务)的安全问题,特别是IMDS v1和v2版本在凭证泄露方面的差异。研究者通过实验展示了如何从VM内部和外部获取临时访问密钥,并分析了不同场景下的日志记录情况,以帮助检测潜在的安全威胁。 2025-2-23 05:13:0 Author: www.hecfblog.com(查看原文) 阅读量:14 收藏

By February 22, 2025

Hello Reader,

  This week the real question is, can anyone stop Ilya Kobzar's winning streak? Here again is he back with another winning answer and some very thorough research all about what happens when credentials are taken via IMDS on AWS.

The Challenge:

 AWS IAM Roles are often targeted by threat actors after they get access to a running virtual machine. While AWS IMDS v2 may prevent some attacks the functionality is still there and is being actively exploited to get credentials and act as a service or role. In this challenge I want you to try the following and document what logs are left that could be used to detect or determine these actions occurred. 

1. Retrieve a temporary AWS access key credential from IMDS v1

2. Retrieve a temporary AWS access key credential from IMDS v2

3. Use the temporary access key within an AWS vm

4. Use the temporary access key from outside of AWS

From all four scenarios determine what logs are created.

bonus: Try and document other scenarios of theft and use and additional sources of evidence.  

The winning answer:

https://www.ilyakobzar.com/p/ec2-iam-role-sts-credentials-compromise


文章来源: https://www.hecfblog.com/2025/02/daily-blog-757-solution-saturday-22225.html
如有侵权请联系:admin#unsafe.sh