Learn AWS hacking from zero to hero with htARTE (HackTricks AWS Red Team Expert)!
Other ways to support HackTricks:
- If you want to see your company advertised in HackTricks or download HackTricks in PDF Check the SUBSCRIPTION PLANS!
- Get the official PEASS & HackTricks swag
- Discover The PEASS Family, our collection of exclusive NFTs
- Join the 💬 Discord group or the telegram group or follow us on Twitter 🐦 @hacktricks_live.
- Share your hacking tricks by submitting PRs to the HackTricks and HackTricks Cloud github repos.
Amazon Simple Queue Service (SQS) is presented as a fully managed message queuing service. Its main function is to assist in the scaling and decoupling of microservices, distributed systems, and serverless applications. The service is designed to remove the need for managing and operating message-oriented middleware, which can often be complex and resource-intensive. This elimination of complexity allows developers to direct their efforts towards more innovative and differentiating aspects of their work.
# Get queues info
aws sqs list-queues
aws sqs get-queue-attributes --queue-url <url> --attribute-names All
# More about this in privesc & post-exploitation
aws sqs receive-message --queue-url <value>
aws sqs send-message --queue-url <value> --message-body <value>
{% hint style="danger" %}
Also, even if the --queue-url
contains the region make sure you specify the correct region in --region
or you will get an error that looks like indicate that you don't have access but the problem is the region.
{% endhint %}
{% content-ref url="../aws-unauthenticated-enum-access/aws-sqs-unauthenticated-enum.md" %} aws-sqs-unauthenticated-enum.md {% endcontent-ref %}
{% content-ref url="../aws-privilege-escalation/aws-sqs-privesc.md" %} aws-sqs-privesc.md {% endcontent-ref %}
{% content-ref url="../aws-post-exploitation/aws-sqs-post-exploitation.md" %} aws-sqs-post-exploitation.md {% endcontent-ref %}
{% content-ref url="../aws-persistence/aws-sqs-persistence.md" %} aws-sqs-persistence.md {% endcontent-ref %}
Learn AWS hacking from zero to hero with htARTE (HackTricks AWS Red Team Expert)!
Other ways to support HackTricks:
- If you want to see your company advertised in HackTricks or download HackTricks in PDF Check the SUBSCRIPTION PLANS!
- Get the official PEASS & HackTricks swag
- Discover The PEASS Family, our collection of exclusive NFTs
- Join the 💬 Discord group or the telegram group or follow us on Twitter 🐦 @hacktricks_live.
- Share your hacking tricks by submitting PRs to the HackTricks and HackTricks Cloud github repos.