Files
hacktricks-cloud/pentesting-cloud/aws-security/aws-persistence/aws-rds-persistence.md
2024-12-12 19:35:48 +01:00

3.3 KiB

AWS - RDS Persistence

{% hint style="success" %} Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)

Support HackTricks
{% endhint %}

RDS

For more information check:

{% content-ref url="../aws-services/aws-relational-database-rds-enum.md" %} aws-relational-database-rds-enum.md {% endcontent-ref %}

Make instance publicly accessible: rds:ModifyDBInstance

An attacker with this permission can modify an existing RDS instance to enable public accessibility.

{% code overflow="wrap" %}

aws rds modify-db-instance --db-instance-identifier target-instance --publicly-accessible --apply-immediately

{% endcode %}

Create an admin user inside the DB

An attacker could just create a user inside the DB so even if the master users password is modified he doesn't lose the access to the database.

Make snapshot public

{% code overflow="wrap" %}

aws rds modify-db-snapshot-attribute --db-snapshot-identifier <snapshot-name> --attribute-name restore --values-to-add all

{% endcode %}

{% hint style="success" %} Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)

Support HackTricks
{% endhint %}