

<feed xmlns="http://www.w3.org/2005/Atom">
  <id>https://ghostarea.net/</id>
  <title>Ghost Area</title>
  <subtitle>A ghost journey in the shell.</subtitle>
  <updated>2025-08-18T16:42:34+07:00</updated>
  <author>
    <name>mRb0x</name>
    <uri>https://ghostarea.net/</uri>
  </author>
  <link rel="self" type="application/atom+xml" href="https://ghostarea.net/feed.xml"/>
  <link rel="alternate" type="text/html" hreflang="en"
    href="https://ghostarea.net/"/>
  <generator uri="https://jekyllrb.com/" version="4.3.3">Jekyll</generator>
  <rights> © 2025 mRb0x </rights>
  <icon>/assets/img/favicons/favicon.ico</icon>
  <logo>/assets/img/favicons/favicon-96x96.png</logo>


  
  <entry>
    <title>AWS Pentesting Cheat Sheet (Privesc)</title>
    <link href="https://ghostarea.net/posts/AWS-Cheatsheet-Privesc/" rel="alternate" type="text/html" title="AWS Pentesting Cheat Sheet (Privesc)" />
    <published>2025-05-26T04:10:00+07:00</published>
  
    <updated>2025-05-26T04:10:00+07:00</updated>
  
    <id>https://ghostarea.net/posts/AWS-Cheatsheet-Privesc/</id>
    <content src="https://ghostarea.net/posts/AWS-Cheatsheet-Privesc/" />
    <author>
      <name>mRb0x</name>
    </author>

  
    
    <category term="Cheat Sheet" />
    
  

  <summary>Reference

Core Concepts

  iam:PassRole: Lets you pass an IAM role to a service (e.g., EC2, Lambda).
  iam:Create, iam:Put, iam:UpdateAssumeRolePolicy: Can lead to full compromise.
  Abusable Services: EC2, Lambda, CloudFormation, Glue, SageMaker, DataPipeline.


1. iam:PassRole + Service Abuse
If you can pass a high-privilege role and start a service that uses it → escalation.
a. EC2
aws ec2 ...</summary>

  </entry>

  
  <entry>
    <title>AWS Pentesting Cheat Sheet (EC2)</title>
    <link href="https://ghostarea.net/posts/AWS-Cheatsheet-EC2/" rel="alternate" type="text/html" title="AWS Pentesting Cheat Sheet (EC2)" />
    <published>2025-05-26T03:50:00+07:00</published>
  
    <updated>2025-05-26T03:50:00+07:00</updated>
  
    <id>https://ghostarea.net/posts/AWS-Cheatsheet-EC2/</id>
    <content src="https://ghostarea.net/posts/AWS-Cheatsheet-EC2/" />
    <author>
      <name>mRb0x</name>
    </author>

  
    
    <category term="Cheat Sheet" />
    
  

  <summary>Reference

  AWS-CLI-EC2


1. List EC2 Instances
Shows instance IDs, public IPs, AMIs, key names, IAM roles, etc.
aws ec2 describe-instances --region [region]

Use JMESPath filters for cleaner output:
aws ec2 describe-instances --query &amp;quot;Reservations[*].Instances[*].[InstanceId,PublicIpAddress,State.Name,KeyName,IamInstanceProfile.Arn]&amp;quot;

2. Get Detailed Info on a Specific Instance
aws ec2 descri...</summary>

  </entry>

  
  <entry>
    <title>AWS Pentesting Cheat Sheet (Lambda)</title>
    <link href="https://ghostarea.net/posts/AWS-Cheatsheet-Lambda/" rel="alternate" type="text/html" title="AWS Pentesting Cheat Sheet (Lambda)" />
    <published>2025-05-26T03:45:00+07:00</published>
  
    <updated>2025-05-26T03:45:00+07:00</updated>
  
    <id>https://ghostarea.net/posts/AWS-Cheatsheet-Lambda/</id>
    <content src="https://ghostarea.net/posts/AWS-Cheatsheet-Lambda/" />
    <author>
      <name>mRb0x</name>
    </author>

  
    
    <category term="Cheat Sheet" />
    
  

  <summary>Reference

  AWS-CLI-Lambda


1. List All Lambda Functions
Shows names, runtimes, ARNs, and last modified dates.
aws lambda list-functions --region [region]


2. Get Detailed Info on a Function
a. Get full function config (IAM role, runtime, env vars, etc.)
aws lambda get-function-configuration --function-name [function-name]

b. Get code download URL + deployment details
Returns a pre-signed S...</summary>

  </entry>

  
  <entry>
    <title>AWS Pentesting Cheat Sheet (S3)</title>
    <link href="https://ghostarea.net/posts/AWS-Cheatsheet-S3/" rel="alternate" type="text/html" title="AWS Pentesting Cheat Sheet (S3)" />
    <published>2025-05-26T03:40:00+07:00</published>
  
    <updated>2025-05-26T03:40:00+07:00</updated>
  
    <id>https://ghostarea.net/posts/AWS-Cheatsheet-S3/</id>
    <content src="https://ghostarea.net/posts/AWS-Cheatsheet-S3/" />
    <author>
      <name>mRb0x</name>
    </author>

  
    
    <category term="Cheat Sheet" />
    
  

  <summary>Reference

  AWS-CLI-S3


S3 Bucket Enumerating Cheat Sheet

1. List Buckets in the Authenticated Account
aws s3 ls

2. Check if a Bucket Exists (No Auth)
aws s3 ls s3://[bucket-name] --no-sign-request


3. List Contents of a Public or Accessible Bucket
aws s3 ls s3://[bucket-name]/[optional-path] --no-sign-request

4. Download an Object
aws s3 cp s3://[bucket-name]/[key] [local-file] --no-sign...</summary>

  </entry>

  
  <entry>
    <title>AWS Pentesting Cheat Sheet (IAM)</title>
    <link href="https://ghostarea.net/posts/AWS-Cheatsheet-IAM/" rel="alternate" type="text/html" title="AWS Pentesting Cheat Sheet (IAM)" />
    <published>2025-05-26T03:25:00+07:00</published>
  
    <updated>2025-05-26T03:25:00+07:00</updated>
  
    <id>https://ghostarea.net/posts/AWS-Cheatsheet-IAM/</id>
    <content src="https://ghostarea.net/posts/AWS-Cheatsheet-IAM/" />
    <author>
      <name>mRb0x</name>
    </author>

  
    
    <category term="Cheat Sheet" />
    
  

  <summary>Reference

  AWS-CLI-IAM


Configure AWS Access &amp;amp;amp; Secret Key

# Create profile.
aws configure --profile [name]

# Check whoami.
aws sts get-caller-identity --profile [name]


List IAM Uses
aws iam get-user --profile [name]
aws iam list-users --profile [name]
aws iam list-access-keys --profile [name]


Get User Permissions
List attached managed policies
aws iam list-attached-user-policies --...</summary>

  </entry>

</feed>


