You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: README.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -255,7 +255,7 @@ Further documentation on how to query for specific API calls made to each servic
255
255
256
256
Behavioral-based detection is currently being researched and developed by [Ryan Stalets](https://twitter.com/RyanStalets). [GitHub issue #46](https://github.com/salesforce/endgame/issues/46) is being used to track this work. We welcome all contributions and discussion!
257
257
258
-
#### Further blue Team Reading
258
+
#### Further Blue Team Reading
259
259
260
260
Additional information on AWS resource policies, how this tool works in the victim account, and identification/containment suggestions is [here](docs/resource-policy-primer.md).
Copy file name to clipboardexpand all lines: docs/resource-policy-primer.md
+5-2
Original file line number
Diff line number
Diff line change
@@ -16,14 +16,17 @@ Endgame can run in two modes, ```expose``` or ```smash```. The less-destructive
16
16
17
17
```smash```, on the other hand, is more destructive (and louder). ```smash``` can run on a single service or all supported services. In either case, for each service it enumerates a list of resources in that region, reads the current resource policy on each, and applies a new policy which includes the "evil principal" the attacker has specified. The net effect of this is that depending on the privileges they have in the victim account, an attacker can insert dozens of back doors which are not controlled by the victim's IAM policies.
18
18
19
-
These back doors largely grant access to accomplish data exfiltration from buckets, snapshots, etc. However, other things could be possible depending on the victim account's architecture:
19
+
These back doors largely grant access to accomplish data exfiltration from buckets, snapshots, etc. However, other things could be possible depending on the victim account's architecture. For example, an attacker could use these back doors to:
20
20
21
21
* Escalate privileges by enabling the attacker's evil principal to assume roles in the victim account
22
22
* Manipulate CI/CD pipelines which rely on AWS S3 as an artifact source
23
23
* Modify Lambda functions to include back doors, skimmers, etc for Lambda-based serverless applications
24
24
* Invoke Lambda functions with unfiltered input, bypassing API Gateway for serverless API's
25
25
* Provide attacker-defined input to applications which leverage SQS or SNS for work control
26
26
* Pivot to other applications which have credentials stored in Secrets Manager
27
+
* And more!
27
28
28
29
### Incident Identification & Containment Steps
29
-
In incidents where resource policies may have been modified (can be determined using CloudTrail, see [risks](docs/risks/)), each resource policy should be reviewed to identify potential back doors or unintended internet exposure. The attacker's interactions with these resources should also be reviewed where possible. CloudTrail only logs data-level events (S3 object retrieval, Lambda function invocation, etc) for three services: S3, Lambda, and KMS. This visibility is also not enabled by default on trails. Other management-level events such as manipulation of Lambda function code will be visible in a standard management-event CloudTrail trail.
30
+
In incidents where resource policies may have been modified (can be determined using CloudTrail, see [risks](/docs/risks/)), each resource policy should be reviewed to identify potential back doors or unintended internet exposure. The attacker's interactions with these resources should also be reviewed where possible.
31
+
32
+
CloudTrail only logs data-level events (S3 object retrieval, Lambda function invocation, etc) for three services: S3, Lambda, and KMS. This visibility is also not enabled by default on trails. Other management-level events such as manipulation of Lambda function code will be visible in a standard management-event CloudTrail trail. Further documentation for working with CloudTrail can be found [here](https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-getting-started.html).
0 commit comments