Files
hacktricks-cloud/pentesting-cloud/aws-security/aws-post-exploitation/aws-lightsail-post-exploitation.md
2024-12-12 19:35:48 +01:00

3.4 KiB

AWS - Lightsail Post Exploitation

{% hint style="success" %} Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)

Support HackTricks
{% endhint %}

Lightsail

For more information, check:

{% content-ref url="../aws-services/aws-lightsail-enum.md" %} aws-lightsail-enum.md {% endcontent-ref %}

Restore old DB snapshots

If the DB is having snapshots, you might be able to find sensitive information currently deleted in old snapshots. Restore the snapshot in a new database and check it.

Restore Instance Snapshots

Instance snapshots might contain sensitive information of already deleted instances or sensitive info that is deleted in the current instance. Create new instances from the snapshots and check them.
Or export the snapshot to an AMI in EC2 and follow the steps of a typical EC2 instance.

Access Sensitive Information

Check out the Lightsail privesc options to learn different ways to access potential sensitive information:

{% content-ref url="../aws-privilege-escalation/aws-lightsail-privesc.md" %} aws-lightsail-privesc.md {% endcontent-ref %}

{% hint style="success" %} Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)

Support HackTricks
{% endhint %}