У нас вы можете посмотреть бесплатно Command Injection to EC2 User Data Privilege Escalation(AWS-Red team lab)(Watch at 2x) или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
Writeup: / command-injection-to-ec2-user-data-privile... Join us as we explore and expand access within their AWS environment, demonstrating the critical impact of even basic user compromise. We'll take you step-by-step from initial access to full root compromise on an EC2 instance! What You'll Learn & Do in This Video: Initial Access & AWS Enumeration: Starting with compromised AWS user credentials, we'll use the AWS CLI to gather intel on the environment, including IAM policies and EC2 instances. Web Application Recon & Command Injection: Discover a vulnerable web application and exploit a critical OS Command Injection flaw to gain a foothold. Linux Privilege Escalation (Foothold): Leverage the command injection to extract an SSH key, allowing us to pivot from the web server to a user session on the EC2 instance. IAM Role Enumeration & Assumption: Query the instance metadata service to identify and assume a powerful IAM role attached to the EC2 instance. AWS Privilege Escalation to Root: Exploit the assumed IAM role's permissions to modify EC2 user data, injecting a payload that grants us Root Access on the instance upon reboot. Defense & Mitigation: Understand the common pitfalls and learn how to prevent such command injection vulnerabilities and secure your AWS environment. Difficulty: Beginner Focus: Red Team / Offensive Security Real-World Context: This lab highlights the significant danger of OS Command Injections – a common and critical vulnerability where untrusted user input can lead to arbitrary code execution if not properly validated. We also show how initial user compromise (like via smishing) can lead to a full environment takeover in the cloud. Lab Prerequisites: Basic Linux command line knowledge Basic web knowledge