xct's notes
Search…
Introduction
Red Team
Active Directory
Host Enum
Payloads
Passwords
Privilege Escalation
Evasion & Bypasses
Concepts & Research
Binary Exploitation
Web
Cloud
Terraform
AWS
Mobile
Hardware
Crypto
Templates
Misc
Blue Team
Active Directory
Malware Analysis
SIEM
Misc
Labs
Keys & Signing
Language & Framwork Specifics
Misc
HackTheBox
Crossfit
Luanne
APT
Attended
Delivery
Cereal
Powered By
GitBook
AWS
Cognito
Identity pools allow to grant users access to AWS Services. We just have to know the id and we will get credentials from an endpoint.
Enumerate permissions associated with cognito credentials with
enumerate-iam
.
Resources
​
Internet-Scale Analysis of AWS Cognito Security
​
Desired State Configuration (DSC)
Automates configuration windows servers & clients. Can be written as ps1 and then must then be compiled to .mof files.
Amazon Systems Manager (SSM)
Can apply DSCs to machines. This requires the "Command Document" "AWS-ApplyDSCMofs".
InSpec
​
Inspec
allows to check deployed labs for correctness.
Resources
​
https://www.mdsec.co.uk/2020/04/designing-the-adversary-simulation-lab/
​
Previous
Terraform
Next - Red Team
Mobile
Last modified
1yr ago
Copy link
Contents
Cognito
Desired State Configuration (DSC)
Amazon Systems Manager (SSM)
InSpec
Resources