module

Command Shell, Bind SSM (via AWS API)

Disclosed
N/A
Created
2023-06-01

Description

Creates an interactive shell using AWS SSM

Author

RageLtMan rageltman@sempervictus

Platform

All

Architectures

x86, x86_64, x64, mips, mipsle, mipsbe, mips64, mips64le, ppc, ppce500v2, ppc64, ppc64le, cbea, cbea64, sparc, sparc64, armle, armbe, aarch64, cmd, php, tty, java, ruby, dalvik, python, nodejs, firefox, zarch, r, riscv32be, riscv32le, riscv64be, riscv64le, loongarch64

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use payload/generic/shell_bind_aws_ssm
msf payload(shell_bind_aws_ssm) > show actions
...actions...
msf payload(shell_bind_aws_ssm) > set ACTION < action-name >
msf payload(shell_bind_aws_ssm) > show options
...show and set options...
msf payload(shell_bind_aws_ssm) > run

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.