AWS AccessKey Tools: Powerful Security Assessment and Penetration Testing Tools

Introduction

accesskey_tools is a red team exploitation tool designed specifically for cloud environment penetration. This article will introduce the functions and uses of accesskey_tools, and explore its value and practical application in security assessment and penetration testing.

Function description

  • IAM queries the current user permissions of aksk. Enter "enum" to perform interface service blasting.

  • EC2 Query the detailed information of EC2 machine instances in various AWS regions. The specified instance can execute system commands. Trace cleaning: delete the created policy and bound IAM.

  • RDS queries all rds details of AWS, as well as IP whitelist restriction information.

  • S3 queries all s3 bucket bucket information, and you can specify the bucket and bucket folder.

  • ROUTE53 queries the domain name DNS records created by AWS in all regions.

  • URL_CONSOLE Use aksk to apply for a federation token and obtain console permissions (valid time: 15 minutes)

Get started quickly

IAM permission query Usage scenario:

After obtaining aksk, query its permissions. Enter "enum" to enumerate the API. For example, the s3 list_buckets API interface. (Only blast query service list get describe)

Query and execute commands on the ec2 machine instance.

After executing the script, the ec2 machine instance status in each region will be automatically retrieved and json will be returned.

You can choose whether to delete the created roles and policies.

You can also delete the iam bound to the ec2 machine.

Enter the machine instance to execute the command. The type of command to be executed will be automatically selected based on the data in json:

"Linux": "AWS-RunShellScript",
"windows": "AWS-RunPowerShellScript",

RDS queries all rds details of AWS,

as well as IP whitelist restriction information.

S3 queries all s3 bucket bucket information

all mode downloads all files in all buckets.

You can specify the bucket and bucket folder.

ROUTE53

Query the domain name DNS records created by AWS in all regions.

URL_CONSOLE

Use aksk to apply for a federation token and obtain console permissions (valid time: 15 minutes)

project url for github

https://github.com/kohlersbtuh15/accesskey_tools

Last updated