module

Amazon Web Services EC2 SSM enumeration

Disclosed
N/A
Created
2023-06-01

Description

Provided AWS credentials, this module will call the authenticated
API of Amazon Web Services to list all SSM-enabled EC2 instances
accessible to the account. Once enumerated as SSM-enabled, the
instances can be controlled using out-of-band WebSocket sessions
provided by the AWS API (nominally, privileged out of the box).
This module provides not only the API enumeration identifying EC2
instances accessible via SSM with given credentials, but enables
session initiation for all identified targets (without requiring
target-level credentials) using the CreateSession datastore option.
The module also provides an EC2 ID filter and a limiting throttle
to prevent session stampedes or expensive messes.

Author

RageLtMan rageltman@sempervictus

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use auxiliary/cloud/aws/enum_ssm
msf auxiliary(enum_ssm) > show actions
...actions...
msf auxiliary(enum_ssm) > set ACTION < action-name >
msf auxiliary(enum_ssm) > show options
...show and set options...
msf auxiliary(enum_ssm) > run

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.