Execute Discovery Commands on an EC2 Instance
Platform: AWS
MITRE ATT&CK Tactics
- Discovery
Description
This simulates an attacker performing discovery actions from a compromised EC2 instance. The commands will be run under the identity of the EC2 instance role A smattering of discovery commands are run the targeted EC2 instance including:
- sts:GetCallerIdentity
- s3:ListBuckets
- iam:GetAccountSummary
- iam:ListRoles
- iam:ListUsers
- iam:GetAccountAuthorizationDetails
- ec2:DescribeSnapshots
- cloudtrail:DescribeTrails
- guardduty:ListDetectors
Attacker Actions:
The following AWS API calls are made from the targeted EC2 instance: - sts:GetCallerIdentity - s3:ListBuckets - iam:GetAccountSummary - iam:ListRoles - iam:ListUsers - iam:GetAccountAuthorizationDetails - ec2:DescribeSnapshots - cloudtrail:DescribeTrails - guardduty:ListDetectors
Workflow Inputs:
Specify which user this attack should run as.
Clean Up:
None - no resources are modified.
Execution Instructions
- See User Guide for Execution Instructions via the Google Cloud Console
- Programmatically execute this workflow with the following cli command:
Detection Artifacts
Refer to Stratus Red Team documentation for detailed detection artifacts produced by this attack technique.