You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
[](https://gitter.im/salesforce/endgame?utm_source=badge&utm_medium=badge&utm_campaign=pr-badge&utm_content=badge)
7
+
[](https://gitter.im/salesforce/endgame?utm_source=badge&utm_medium=badge&utm_campaign=pr-badge&utm_content=badge)
`endgame` can create backdoors for resources in any of the services listed below. While AWS Access Analyzer is meant to detect exposed resources of these types, it currently only supports 7/18 of the services that `endgame` attacks.
35
-
36
-
| Backdoor Resource Type | Support |[AWS Access Analyzer Support][1]|
`endgame` can create backdoors for resources in any of the services listed below.
34
+
35
+
> ‼️ **Note**: At the time of this writing, [AWS Access Analyzer](https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-resources.html) does **NOT** support auditing **11 out of the 18 services** that `endgame` attacks. Given that Access Analyzer is intended to detect this exact kind of violation, we kindly suggest to the AWS Team that they support all resources that can be attacked using `endgame`. 😊
36
+
37
+
38
+
| Backdoor Resource Type | Support |[AWS Access Analyzer Support][1]|
The following IAM Permissions are used to create these backdoors:
188
+
The IAM Permissions listed below are used to create these backdoors.
189
+
190
+
> **NOTE**: You don't need **all** of these permissions to run the tool. You just need enough from each service. So, `s3:ListAllMyBuckets`, `s3:GetBucketPolicy`, and `s3:PutBucketPolicy` are all the permissions needed to leverage this tool to expose S3 buckets.
218
191
219
192
```json
220
193
{
@@ -228,9 +201,12 @@ The following IAM Permissions are used to create these backdoors:
228
201
"acm-pca:GetPolicy",
229
202
"acm-pca:ListCertificateAuthorities",
230
203
"acm-pca:PutPolicy",
204
+
"ec2:DescribeImageAttribute",
205
+
"ec2:DescribeImages",
231
206
"ec2:DescribeSnapshotAttribute",
232
207
"ec2:DescribeSnapshots",
233
208
"ec2:ModifySnapshotAttribute",
209
+
"ec2:ModifyImageAttribute",
234
210
"ecr:DescribeRepositories",
235
211
"ecr:DeleteRepositoryPolicy",
236
212
"ecr:GetRepositoryPolicy",
@@ -269,8 +245,8 @@ The following IAM Permissions are used to create these backdoors:
269
245
"rds:DescribeDbSnapshotAttributes",
270
246
"rds:ModifyDbSnapshotAttribute",
271
247
"rds:ModifyDbClusterSnapshotAttribute",
272
-
"s3:ListAllMyBuckets",
273
248
"s3:GetBucketPolicy",
249
+
"s3:ListAllMyBuckets",
274
250
"s3:PutBucketPolicy",
275
251
"secretsmanager:GetResourcePolicy",
276
252
"secretsmanager:DeleteResourcePolicy",
@@ -297,8 +273,6 @@ The following IAM Permissions are used to create these backdoors:
297
273
}
298
274
```
299
275
300
-
You don't need **all** of these permissions to run the tool. You just need enough from each service. So, `s3:ListAllMyBuckets`, `s3:GetBucketPolicy`, and `s3:PutBucketPolicy` are all the permissions needed to leverage this tool to expose S3 buckets.
* Run [pytest](https://docs.pytest.org/en/stable/) with the following:
6
+
7
+
```bash
8
+
make test
9
+
```
10
+
11
+
## Security tests
12
+
13
+
* Run [bandit](https://bandit.readthedocs.io/en/latest/) with the following:
14
+
15
+
```bash
16
+
make security-test
17
+
```
18
+
19
+
## Integration tests
20
+
21
+
After making any modifications to the program, you can run a full-fledged integration test, using this program against your own test infrastructure in AWS.
22
+
23
+
* First, set your environment variables
24
+
25
+
```bash
26
+
# Set the environment variable for the username that you will create a backdoor for.
The IAM Permissions listed below are used to create these backdoors.
4
+
5
+
> **NOTE**: You don't need **all** of these permissions to run the tool. You just need enough from each service. So, `s3:ListAllMyBuckets`, `s3:GetBucketPolicy`, and `s3:PutBucketPolicy` are all the permissions needed to leverage this tool to expose S3 buckets.
0 commit comments