AdvancedPurrsistentCat

39 Followers
108 Following
24 Posts
Hi, I am rootcat | Redteam/Cloud Dude (he/him)| Hacking| Shitpost through your firewall| Fan of cats -allergic to cats| My Opinions belong to the fey folk| 🌈 |
UwUyes
le bloghttps://rootcat.de/blog/
I bring the truth!
Wake up sheeple:

Do not work as a Hacker - A Warning to you all

You want to be a Pentester, a Redteamer, you wanna hack for a living, cause you heard it is great?

Don't. Keep your sanity. It does things to you. A mad Hackers warning:

https://rootcat.de/blog/do_not_work_hacker24/

Do not work as a Hacker - A Warning to you all :: Rootcat

Hey rootcat, how can I start to learn hacking? Hello Mr. Rootcat, can you recommend a starting point, for me to learn penetration testing? Hola señor rootcat, can you help me land a job as a red teamer? Buddy, don’t! I’m warning you! Just don’t, I spray you with a water bottle! Let’s get one thing strait, this will not be a well-structured and thought-out, or balanced blogpost, this will just be a one-take rant with some fun and a little madness.

Behold the Darknet! Leaks, drugs, exploits and shady services. A place where the scum of the galaxy meet.

Meanwhile, me in the Darknet: I'm gonna visit the sleeping kitten again and spread some glitter. 🪩✨

Big UwU to DarkVault gang 😻

Imagine you are in a #hacking exam, your goal is to own the DC, get flags, all that jazz...
Instead of all this ad hassle 😳, proxying🙄, kerberos 😱 and such complicated stuff, in some cases, you can just drop creds via #aws #ec2 userdata ☁️😼
Here is how:

As most exams nowadays use aws ec2 to deploy their virtual maschines, and this is not always done securely, this can enable you to
a)sidestep the exam-path
b)break out the exam-environment

Often meta-data such as the IP of a exam VM is displayed on the desktop, this can be abused under certain circumstances to drop the aws keys, which is generally speaking not a good thing 😼

In order to setup the exam itself, create local admins and such, deploys make use of user-data.
If this data can be accessed and is not secured properly, the whole juicy stuff - creds and everthing can become immediately accessible

Meaning: the whole idea of going through multiple windows clients, doing fancy ad magic, proxy-chaining some stuff can be entirely sidestepped, by accessing the user-data scripts and just look for the passwords
✨😺✨

Check out my blogpost if you like to read up on this in more detail, where to find user and meta-data and thoughts on how to make it a pawsibly a liddle more secure

https://www.rootcat.de/blog/ec2-meta_may23/

Unintended Path to Exam Domination - AWS EC2 Meta-Data :: Rootcat

This is directed to everyone using aws EC2 for CTF’s, labs or offensive security exams. What prompted me to write this, is that the last three times in a row, whenever I found myself in an exam environment for pentesting/redteaming (and yes even one cloud exam), meta-data and user-data basically allowed to circumvent the exam or just strait up break out of the environment. I will not name any names here, instead I want to explain what the problem in this specific case is and provide resources and thoughts at the end in order to provide some help on this issue.