RhinoSecurityLabs / cloudgoat

CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool
BSD 3-Clause "New" or "Revised" License
2.88k stars 597 forks source link

scenario/sqs_flag_shop #236

Closed 3iuy-prog closed 8 months ago

3iuy-prog commented 9 months ago

This is the SQS_FLAG_SHOP scenario, may be the last scenario for our team.

In this scenario, attacker manipulates its own data in the DB by sending an inappropriate message to AWS SQS.

  1. The attacker accesses the web page and identifies the features first.
  2. The attacker checks the privileges it has.
  3. Find the web source code. By analyzing the source code, the attacker checks the format of message sent to the SQS service.
  4. Assume the the sending message role about SQS service.
  5. The attacker, who possesses the necessary permissions, sends a forged message to the SQS service queue.
  6. Check the changed assets, purchase FLAG and check the secret-string.

image

Any comments are welcome. Thank you. :)

andrew-aiken commented 9 months ago

Created a discord thread for easier communication

Hosim33 commented 9 months ago

Thank you for suggesting what needs to be fixed. We've made some changes to fix that it takes time to destroy scenarios. If there's anything else to fix, please let us know!

andrew-aiken commented 9 months ago

Few things

Hosim33 commented 9 months ago

We've fixed the few things. Thank you.

andrew-aiken commented 9 months ago
Hosim33 commented 9 months ago

I deleted the vpc endpoint and modified the log gruop name to reflect your advice. Thank you.

jdearmas commented 8 months ago

This pull request was merged manually at 1049b19