# AWS - SQS Enum {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte)
Support HackTricks * Check the [**subscription plans**](https://github.com/sponsors/carlospolop)! * **Join the** 💬 [**Discord group**](https://discord.gg/hRep4RUj7f) or the [**telegram group**](https://t.me/peass) or **follow** us on **Twitter** 🐦 [**@hacktricks\_live**](https://twitter.com/hacktricks_live)**.** * **Share hacking tricks by submitting PRs to the** [**HackTricks**](https://github.com/carlospolop/hacktricks) and [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repos.
{% endhint %} ## SQS Amazon Simple Queue Service (SQS) is presented as a **fully managed message queuing service**. Its main function is to assist in the scaling and decoupling of microservices, distributed systems, and serverless applications. The service is designed to remove the need for managing and operating message-oriented middleware, which can often be complex and resource-intensive. This elimination of complexity allows developers to direct their efforts towards more innovative and differentiating aspects of their work. ### Enumeration ```bash # Get queues info aws sqs list-queues aws sqs get-queue-attributes --queue-url --attribute-names All # More about this in privesc & post-exploitation aws sqs receive-message --queue-url aws sqs send-message --queue-url --message-body ``` {% hint style="danger" %} Also, even if the `--queue-url` contains the region make sure you specify the correct region in **`--region`** or you will get an error that looks like indicate that you don't have access but the problem is the region. {% endhint %} #### Unauthenticated Access {% content-ref url="../aws-unauthenticated-enum-access/aws-sqs-unauthenticated-enum.md" %} [aws-sqs-unauthenticated-enum.md](../aws-unauthenticated-enum-access/aws-sqs-unauthenticated-enum.md) {% endcontent-ref %} #### Privilege Escalation {% content-ref url="../aws-privilege-escalation/aws-sqs-privesc.md" %} [aws-sqs-privesc.md](../aws-privilege-escalation/aws-sqs-privesc.md) {% endcontent-ref %} #### Post Exploitation {% content-ref url="../aws-post-exploitation/aws-sqs-post-exploitation.md" %} [aws-sqs-post-exploitation.md](../aws-post-exploitation/aws-sqs-post-exploitation.md) {% endcontent-ref %} #### Persistence {% content-ref url="../aws-persistence/aws-sqs-persistence.md" %} [aws-sqs-persistence.md](../aws-persistence/aws-sqs-persistence.md) {% endcontent-ref %} ## References * https://docs.aws.amazon.com/cdk/api/v2/python/aws\_cdk.aws\_sqs/README.html {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte)
Support HackTricks * Check the [**subscription plans**](https://github.com/sponsors/carlospolop)! * **Join the** 💬 [**Discord group**](https://discord.gg/hRep4RUj7f) or the [**telegram group**](https://t.me/peass) or **follow** us on **Twitter** 🐦 [**@hacktricks\_live**](https://twitter.com/hacktricks_live)**.** * **Share hacking tricks by submitting PRs to the** [**HackTricks**](https://github.com/carlospolop/hacktricks) and [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repos.
{% endhint %}