👨‍đŸ’ģ
Hacking Notes
  • Hacking Notes
  • 💅One-Liners
  • âš”ī¸Offensive
    • Exploit Workflow
    • Recon
      • OSINT
      • DNS
        • Domain Discovery
      • Layer 2 Config and Analysis
      • Port Scanning and Discovery
      • Port Attacks
      • Link it all together
    • Payloads
      • MSFVenom
      • Reverse Shells
    • Websites
      • Enumeration
      • Injection/LFI
      • Session Management
      • Brute Forcing
      • JavaScript & XSS
      • SSRF
      • XXE
      • PHP
    • Password Attacks
      • Brute Forcing
      • Mimikatz
      • Password Cracking
      • Hash Extraction
      • Wordlist Generation
    • Databases
      • SQL
      • Mongodb
    • Microsoft Windows Exploits
      • Enumeration
      • Powershell
      • Cmd
      • Privilege Escalation
      • Active Directory
      • Bloodhound
    • Social Engineering
    • Netcat & Socat
    • File Transfers
    • Metasploit
      • Writing Modules
    • PS Empire
    • Priv Escalation
    • Post Exploitation
    • Pivoting
    • Certs and Secrets
    • NGROK
    • Misc.
  • đŸ›Ąī¸Defensive
    • Defensive Notes
    • Windows Forensics
      • Program Execution Artifacts
      • ASEP Locations
      • Event Logs
    • Linux Forensics
    • Network Forensics
      • tshark
      • Wireshark Filters
    • Memory Forensics
    • Stego
    • Malware Analysis
    • Volatility
  • đŸŒŠī¸Cloud
    • Scope and Shared Responsibility
    • AWS CLI
    • Azure CLI
    • SaaS Attacks
    • PaaS
  • âŒ¨ī¸Programming
    • Programming Notes
    • Examples and Quick Scripts
    • PowerShell
    • Pwn
      • Windows Pwn
    • Python
      • Basic Python
      • Modules
      • Working with Files
      • Networking
      • Attack Related
      • Scapy
        • Using Scapy
        • Reading PCAP
    • C
      • Code Examples
      • GDB
    • PHP
Powered by GitBook
On this page
  • Create a Profile
  • S3
  • EC2
  • More Notes

Was this helpful?

  1. Cloud

AWS CLI

PreviousScope and Shared ResponsibilityNextAzure CLI

Last updated 2 years ago

Was this helpful?

Install via pip

Create a Profile

This allows us to store the Access Key ID and Secret Key in a ready to use profile.

aws configure --profile myNewProfile

After, we can call the profile to ask what info can be gathered about the user.

aws sts get-caller-identity --profile myNewProfile

S3

AWS S3 is used for storage

aws s3 ls --profile myNewProfile

aws s3 ls s3://myNewBucket/ --profile myNewProfile

Copy a file from the bucket to local dir

aws s3 cp s3://myNewBucket/lol.txt ./ --profile myNewProfile

Don't forget to check for open buckets!

EC2

We can gather information about our instances to include public IPs and security groups

aws ec2 describe-instances --profile myNewProfile
aws ec2 describe-instances --profile myNewProfile | jq '.Reservations[] | .Instances[] .PublicIpAddress'

Create a keypair to be used in EC2

aws ec2 create-key-pair --profile m4lwhere --key-name m4lwhere --query 'KeyMaterial' --output text > ~/.ssh/m4lwhere.pem

More Notes

đŸŒŠī¸
Grayhatwarfare
AWScheat-sheets
Logo
Logo