Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

update(ssm_run_command): advanced attacks #441

Conversation

saw-your-packet
Copy link
Contributor

The PR contains an update on the techniques from https://hackingthe.cloud/aws/post_exploitation/run_shell_commands_on_ec2/
I added references and examples from a research I've conducted last year around SSM Send Command. The update contains the usage of a tool I've developed called EC2StepShell and 7 other SSM Documents that can be used to execute system commands, along with a repository with SSM payloads.

@Frichetten
Copy link
Contributor

Hey Eduard 👋 Sorry for the delay in reviewing this one. Everything looks good to me! Thank you for putting in the time to submit this and use all the correct formatting. I'll let this go through CI and as long as everything passes I will merge it.

@Frichetten Frichetten merged commit f2b17ab into Hacking-the-Cloud:main Dec 8, 2024
1 check passed
@saw-your-packet
Copy link
Contributor Author

Thank you, Nick!

@saw-your-packet saw-your-packet deleted the update-postexploitation-ssm-send-command branch December 9, 2024 07:18
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants