mirror of
https://github.com/HackTricks-wiki/hacktricks-cloud.git
synced 2026-01-15 22:32:31 -08:00
Translated ['src/README.md', 'src/banners/hacktricks-training.md', 'src/
This commit is contained in:
@@ -4,11 +4,10 @@
|
||||
|
||||
## AWS - Lightsail
|
||||
|
||||
Amazon Lightsail provides an **easy**, lightweight way for new cloud users to take advantage of AWS’ cloud computing services. It allows you to deploy common and custom web services in seconds via **VMs** (**EC2**) and **containers**.\
|
||||
It's a **minimal EC2 + Route53 + ECS**.
|
||||
Amazon Lightsail offre un modo **facile** e leggero per i nuovi utenti del cloud di sfruttare i servizi di cloud computing di AWS. Ti consente di distribuire servizi web comuni e personalizzati in pochi secondi tramite **VM** (**EC2**) e **contenitori**.\
|
||||
È un **EC2 minimo + Route53 + ECS**.
|
||||
|
||||
### Enumeration
|
||||
|
||||
```bash
|
||||
# Instances
|
||||
aws lightsail get-instances #Get all
|
||||
@@ -29,14 +28,13 @@ aws lightsail get-load-balancers
|
||||
aws lightsail get-static-ips
|
||||
aws lightsail get-key-pairs
|
||||
```
|
||||
### Analizza Snapshot
|
||||
|
||||
### Analyse Snapshots
|
||||
È possibile generare **snapshot di istanze e database relazionali da lightsail**. Pertanto, puoi controllarli allo stesso modo in cui puoi controllare [**snapshot EC2**](aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/#ebs) e [**snapshot RDS**](aws-relational-database-rds-enum.md#enumeration).
|
||||
|
||||
It's possible to generate **instance and relational database snapshots from lightsail**. Therefore you can check those the same way you can check [**EC2 snapshots**](aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/#ebs) and [**RDS snapshots**](aws-relational-database-rds-enum.md#enumeration).
|
||||
### Metadati
|
||||
|
||||
### Metadata
|
||||
|
||||
**Metadata endpoint is accessible from lightsail**, but the machines are running in an **AWS account managed by AWS** so you don't control **what permissions are being granted**. However, if you find a way to exploit those you would be directly exploiting AWS.
|
||||
**L'endpoint dei metadati è accessibile da lightsail**, ma le macchine sono in esecuzione in un **account AWS gestito da AWS** quindi non controlli **quali permessi vengono concessi**. Tuttavia, se trovi un modo per sfruttarli, staresti sfruttando direttamente AWS.
|
||||
|
||||
### Privesc
|
||||
|
||||
@@ -44,20 +42,16 @@ It's possible to generate **instance and relational database snapshots from ligh
|
||||
../aws-privilege-escalation/aws-lightsail-privesc.md
|
||||
{{#endref}}
|
||||
|
||||
### Post Exploitation
|
||||
### Post Sfruttamento
|
||||
|
||||
{{#ref}}
|
||||
../aws-post-exploitation/aws-lightsail-post-exploitation.md
|
||||
{{#endref}}
|
||||
|
||||
### Persistence
|
||||
### Persistenza
|
||||
|
||||
{{#ref}}
|
||||
../aws-persistence/aws-lightsail-persistence.md
|
||||
{{#endref}}
|
||||
|
||||
{{#include ../../../banners/hacktricks-training.md}}
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Reference in New Issue
Block a user