Skip to content

Commit 1c0a7bc

Browse files
committed
Fix typos
1 parent 170e152 commit 1c0a7bc

File tree

2 files changed

+6
-3
lines changed

2 files changed

+6
-3
lines changed

README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -255,7 +255,7 @@ Further documentation on how to query for specific API calls made to each servic
255255

256256
Behavioral-based detection is currently being researched and developed by [Ryan Stalets](https://twitter.com/RyanStalets). [GitHub issue #46](https://github.com/salesforce/endgame/issues/46) is being used to track this work. We welcome all contributions and discussion!
257257

258-
#### Further blue Team Reading
258+
#### Further Blue Team Reading
259259

260260
Additional information on AWS resource policies, how this tool works in the victim account, and identification/containment suggestions is [here](docs/resource-policy-primer.md).
261261

docs/resource-policy-primer.md

+5-2
Original file line numberDiff line numberDiff line change
@@ -16,14 +16,17 @@ Endgame can run in two modes, ```expose``` or ```smash```. The less-destructive
1616

1717
```smash```, on the other hand, is more destructive (and louder). ```smash``` can run on a single service or all supported services. In either case, for each service it enumerates a list of resources in that region, reads the current resource policy on each, and applies a new policy which includes the "evil principal" the attacker has specified. The net effect of this is that depending on the privileges they have in the victim account, an attacker can insert dozens of back doors which are not controlled by the victim's IAM policies.
1818

19-
These back doors largely grant access to accomplish data exfiltration from buckets, snapshots, etc. However, other things could be possible depending on the victim account's architecture:
19+
These back doors largely grant access to accomplish data exfiltration from buckets, snapshots, etc. However, other things could be possible depending on the victim account's architecture. For example, an attacker could use these back doors to:
2020

2121
* Escalate privileges by enabling the attacker's evil principal to assume roles in the victim account
2222
* Manipulate CI/CD pipelines which rely on AWS S3 as an artifact source
2323
* Modify Lambda functions to include back doors, skimmers, etc for Lambda-based serverless applications
2424
* Invoke Lambda functions with unfiltered input, bypassing API Gateway for serverless API's
2525
* Provide attacker-defined input to applications which leverage SQS or SNS for work control
2626
* Pivot to other applications which have credentials stored in Secrets Manager
27+
* And more!
2728

2829
### Incident Identification & Containment Steps
29-
In incidents where resource policies may have been modified (can be determined using CloudTrail, see [risks](docs/risks/)), each resource policy should be reviewed to identify potential back doors or unintended internet exposure. The attacker's interactions with these resources should also be reviewed where possible. CloudTrail only logs data-level events (S3 object retrieval, Lambda function invocation, etc) for three services: S3, Lambda, and KMS. This visibility is also not enabled by default on trails. Other management-level events such as manipulation of Lambda function code will be visible in a standard management-event CloudTrail trail.
30+
In incidents where resource policies may have been modified (can be determined using CloudTrail, see [risks](/docs/risks/)), each resource policy should be reviewed to identify potential back doors or unintended internet exposure. The attacker's interactions with these resources should also be reviewed where possible.
31+
32+
CloudTrail only logs data-level events (S3 object retrieval, Lambda function invocation, etc) for three services: S3, Lambda, and KMS. This visibility is also not enabled by default on trails. Other management-level events such as manipulation of Lambda function code will be visible in a standard management-event CloudTrail trail. Further documentation for working with CloudTrail can be found [here](https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-getting-started.html).

0 commit comments

Comments
 (0)