# AWS - Lightsail Enum {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte)
Support HackTricks * Check the [**subscription plans**](https://github.com/sponsors/carlospolop)! * **Join the** 💬 [**Discord group**](https://discord.gg/hRep4RUj7f) or the [**telegram group**](https://t.me/peass) or **follow** us on **Twitter** 🐦 [**@hacktricks\_live**](https://twitter.com/hacktricks_live)**.** * **Share hacking tricks by submitting PRs to the** [**HackTricks**](https://github.com/carlospolop/hacktricks) and [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repos.
{% endhint %} ## AWS - Lightsail Amazon Lightsail provides an **easy**, lightweight way for new cloud users to take advantage of AWS’ cloud computing services. It allows you to deploy common and custom web services in seconds via **VMs** (**EC2**) and **containers**.\ It's a **minimal EC2 + Route53 + ECS**. ### Enumeration ```bash # Instances aws lightsail get-instances #Get all aws lightsail get-instance-port-states --instance-name #Get open ports # Databases aws lightsail get-relational-databases aws lightsail get-relational-database-snapshots aws lightsail get-relational-database-parameters # Disk & snapshots aws lightsail get-instance-snapshots aws lightsail get-disk-snapshots aws lightsail get-disks # More aws lightsail get-load-balancers aws lightsail get-static-ips aws lightsail get-key-pairs ``` ### Analyse Snapshots It's possible to generate **instance and relational database snapshots from lightsail**. Therefore you can check those the same way you can check [**EC2 snapshots**](aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/#ebs) and [**RDS snapshots**](aws-relational-database-rds-enum.md#enumeration). ### Metadata **Metadata endpoint is accessible from lightsail**, but the machines are running in an **AWS account managed by AWS** so you don't control **what permissions are being granted**. However, if you find a way to exploit those you would be directly exploiting AWS. ### Privesc {% content-ref url="../aws-privilege-escalation/aws-lightsail-privesc.md" %} [aws-lightsail-privesc.md](../aws-privilege-escalation/aws-lightsail-privesc.md) {% endcontent-ref %} ### Post Exploitation {% content-ref url="../aws-post-exploitation/aws-lightsail-post-exploitation.md" %} [aws-lightsail-post-exploitation.md](../aws-post-exploitation/aws-lightsail-post-exploitation.md) {% endcontent-ref %} ### Persistence {% content-ref url="../aws-persistence/aws-lightsail-persistence.md" %} [aws-lightsail-persistence.md](../aws-persistence/aws-lightsail-persistence.md) {% endcontent-ref %} {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte)
Support HackTricks * Check the [**subscription plans**](https://github.com/sponsors/carlospolop)! * **Join the** 💬 [**Discord group**](https://discord.gg/hRep4RUj7f) or the [**telegram group**](https://t.me/peass) or **follow** us on **Twitter** 🐦 [**@hacktricks\_live**](https://twitter.com/hacktricks_live)**.** * **Share hacking tricks by submitting PRs to the** [**HackTricks**](https://github.com/carlospolop/hacktricks) and [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repos.
{% endhint %}