mirror of
https://github.com/HackTricks-wiki/hacktricks-cloud.git
synced 2026-01-14 22:03:11 -08:00
Translated ['src/README.md', 'src/banners/hacktricks-training.md', 'src/
This commit is contained in:
@@ -4,11 +4,10 @@
|
||||
|
||||
## AWS - Lightsail
|
||||
|
||||
Amazon Lightsail provides an **easy**, lightweight way for new cloud users to take advantage of AWS’ cloud computing services. It allows you to deploy common and custom web services in seconds via **VMs** (**EC2**) and **containers**.\
|
||||
It's a **minimal EC2 + Route53 + ECS**.
|
||||
Amazon Lightsail bied 'n **maklike**, liggewig manier vir nuwe wolkgebruikers om voordeel te trek uit AWS se wolkrekenaardienste. Dit stel jou in staat om algemene en pasgemaakte webdienste in sekondes te ontplooi via **VMs** (**EC2**) en **houers**.\
|
||||
Dit is 'n **minimale EC2 + Route53 + ECS**.
|
||||
|
||||
### Enumeration
|
||||
|
||||
```bash
|
||||
# Instances
|
||||
aws lightsail get-instances #Get all
|
||||
@@ -29,14 +28,13 @@ aws lightsail get-load-balancers
|
||||
aws lightsail get-static-ips
|
||||
aws lightsail get-key-pairs
|
||||
```
|
||||
### Analiseer Snapshotte
|
||||
|
||||
### Analyse Snapshots
|
||||
|
||||
It's possible to generate **instance and relational database snapshots from lightsail**. Therefore you can check those the same way you can check [**EC2 snapshots**](aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/#ebs) and [**RDS snapshots**](aws-relational-database-rds-enum.md#enumeration).
|
||||
Dit is moontlik om **instansie en relationele databasis snapshotte van lightsail** te genereer. Daarom kan jy dit op dieselfde manier nagaan as wat jy [**EC2 snapshotte**](aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/#ebs) en [**RDS snapshotte**](aws-relational-database-rds-enum.md#enumeration) nagaan.
|
||||
|
||||
### Metadata
|
||||
|
||||
**Metadata endpoint is accessible from lightsail**, but the machines are running in an **AWS account managed by AWS** so you don't control **what permissions are being granted**. However, if you find a way to exploit those you would be directly exploiting AWS.
|
||||
**Metadata-eindpunt is toeganklik vanaf lightsail**, maar die masjiene loop in 'n **AWS-rekening wat deur AWS bestuur word**, so jy beheer nie **watter toestemmings toegeken word** nie. As jy egter 'n manier vind om dit te benut, sal jy direk AWS benut.
|
||||
|
||||
### Privesc
|
||||
|
||||
@@ -44,20 +42,16 @@ It's possible to generate **instance and relational database snapshots from ligh
|
||||
../aws-privilege-escalation/aws-lightsail-privesc.md
|
||||
{{#endref}}
|
||||
|
||||
### Post Exploitation
|
||||
### Post Exploitatie
|
||||
|
||||
{{#ref}}
|
||||
../aws-post-exploitation/aws-lightsail-post-exploitation.md
|
||||
{{#endref}}
|
||||
|
||||
### Persistence
|
||||
### Volharding
|
||||
|
||||
{{#ref}}
|
||||
../aws-persistence/aws-lightsail-persistence.md
|
||||
{{#endref}}
|
||||
|
||||
{{#include ../../../banners/hacktricks-training.md}}
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Reference in New Issue
Block a user