From Zero Access to AWS Keys: EC2 Metadata Exploit Walkthrough
Автор: AWS Hacking with Michal
Загружено: 2025-11-20
Просмотров: 1
Описание:
Starting with zero access and no credentials, this walkthrough shows how a simple misconfiguration in a reverse-proxy server can expose an entire cloud environment.
In this video, you’ll learn how to:
Exploit a Host-header based SSRF to reach the EC2 Instance Metadata Service (IMDS)
Enumerate available IMDS API versions
Retrieve the instance profile IAM role name
Extract temporary AWS access keys exposed by the metadata service
Configure AWS CLI with stolen credentials
Discover accessible S3 buckets
Access and exfiltrate sensitive files stored in S3
Understand the root cause (proxy misconfiguration) and how to fix it
Повторяем попытку...
Доступные форматы для скачивания:
Скачать видео
-
Информация по загрузке: