@@ -4,128 +4,128 @@ This page contains the Stratus attack techniques for AWS, grouped by MITRE ATT&C
4
4
Note that some Stratus attack techniques may correspond to more than a single ATT&CK Tactic.
5
5
6
6
7
- ## Credential Access
8
-
9
- - [ Retrieve EC2 Password Data] ( ./aws.credential-access.ec2-get-password-data.md )
10
-
11
- - [ Steal EC2 Instance Credentials] ( ./aws.credential-access.ec2-steal-instance-credentials.md )
12
-
13
- - [ Retrieve a High Number of Secrets Manager secrets (Batch)] ( ./aws.credential-access.secretsmanager-batch-retrieve-secrets.md )
7
+ ## Initial Access
8
+
9
+ - [ Console Login without MFA] ( ./aws.initial-access.console-login-without-mfa.md )
10
+
14
11
15
- - [ Retrieve a High Number of Secrets Manager secrets] ( ./aws.credential-access.secretsmanager-retrieve-secrets.md )
12
+ ## Execution
13
+
14
+ - [ Launch Unusual EC2 instances] ( ./aws.execution.ec2-launch-unusual-instances.md )
15
+
16
+ - [ Execute Commands on EC2 Instance via User Data] ( ./aws.execution.ec2-user-data.md )
17
+
18
+ - [ Usage of ssm: SendCommand on multiple instances] ( ./aws.execution.ssm-send-command.md )
19
+
20
+ - [ Usage of ssm: StartSession on multiple instances] ( ./aws.execution.ssm-start-session.md )
21
+
16
22
17
- - [ Retrieve And Decrypt SSM Parameters] ( ./aws.credential-access.ssm-retrieve-securestring-parameters.md )
23
+ ## Persistence
24
+
25
+ - [ Backdoor an IAM Role] ( ./aws.persistence.iam-backdoor-role.md )
26
+
27
+ - [ Create an Access Key on an IAM User] ( ./aws.persistence.iam-backdoor-user.md )
28
+
29
+ - [ Create an administrative IAM User] ( ./aws.persistence.iam-create-admin-user.md )
30
+
31
+ - [ Create a backdoored IAM Role] ( ./aws.persistence.iam-create-backdoor-role.md )
32
+
33
+ - [ Create a Login Profile on an IAM User] ( ./aws.persistence.iam-create-user-login-profile.md )
34
+
35
+ - [ Backdoor Lambda Function Through Resource-Based Policy] ( ./aws.persistence.lambda-backdoor-function.md )
36
+
37
+ - [ Add a Malicious Lambda Extension] ( ./aws.persistence.lambda-layer-extension.md )
38
+
39
+ - [ Overwrite Lambda Function Code] ( ./aws.persistence.lambda-overwrite-code.md )
40
+
41
+ - [ Create an IAM Roles Anywhere trust anchor] ( ./aws.persistence.rolesanywhere-create-trust-anchor.md )
42
+
43
+ - [ Generate temporary AWS credentials using GetFederationToken] ( ./aws.persistence.sts-federation-token.md )
44
+
18
45
46
+ ## Privilege Escalation
47
+
48
+ - [ Execute Commands on EC2 Instance via User Data] ( ./aws.execution.ec2-user-data.md )
49
+
50
+ - [ Create an Access Key on an IAM User] ( ./aws.persistence.iam-backdoor-user.md )
51
+
52
+ - [ Create an administrative IAM User] ( ./aws.persistence.iam-create-admin-user.md )
53
+
54
+ - [ Create a Login Profile on an IAM User] ( ./aws.persistence.iam-create-user-login-profile.md )
55
+
56
+ - [ Add a Malicious Lambda Extension] ( ./aws.persistence.lambda-layer-extension.md )
57
+
58
+ - [ Create an IAM Roles Anywhere trust anchor] ( ./aws.persistence.rolesanywhere-create-trust-anchor.md )
59
+
60
+ - [ Change IAM user password] ( ./aws.privilege-escalation.iam-update-user-login-profile.md )
61
+
19
62
20
63
## Defense Evasion
64
+
65
+ - [ Delete CloudTrail Trail] ( ./aws.defense-evasion.cloudtrail-delete.md )
66
+
67
+ - [ Disable CloudTrail Logging Through Event Selectors] ( ./aws.defense-evasion.cloudtrail-event-selectors.md )
68
+
69
+ - [ CloudTrail Logs Impairment Through S3 Lifecycle Rule] ( ./aws.defense-evasion.cloudtrail-lifecycle-rule.md )
70
+
71
+ - [ Stop CloudTrail Trail] ( ./aws.defense-evasion.cloudtrail-stop.md )
72
+
73
+ - [ Delete DNS query logs] ( ./aws.defense-evasion.dns-delete-logs.md )
74
+
75
+ - [ Attempt to Leave the AWS Organization] ( ./aws.defense-evasion.organizations-leave.md )
76
+
77
+ - [ Remove VPC Flow Logs] ( ./aws.defense-evasion.vpc-remove-flow-logs.md )
78
+
21
79
22
- - [ Delete CloudTrail Trail] ( ./aws.defense-evasion.cloudtrail-delete.md )
23
-
24
- - [ Disable CloudTrail Logging Through Event Selectors] ( ./aws.defense-evasion.cloudtrail-event-selectors.md )
25
-
26
- - [ CloudTrail Logs Impairment Through S3 Lifecycle Rule] ( ./aws.defense-evasion.cloudtrail-lifecycle-rule.md )
27
-
28
- - [ Stop CloudTrail Trail] ( ./aws.defense-evasion.cloudtrail-stop.md )
29
-
30
- - [ Delete DNS query logs] ( ./aws.defense-evasion.dns-delete-logs.md )
31
-
32
- - [ Attempt to Leave the AWS Organization] ( ./aws.defense-evasion.organizations-leave.md )
33
-
34
- - [ Remove VPC Flow Logs] ( ./aws.defense-evasion.vpc-remove-flow-logs.md )
35
-
80
+ ## Credential Access
81
+
82
+ - [ Retrieve EC2 Password Data] ( ./aws.credential-access.ec2-get-password-data.md )
83
+
84
+ - [ Steal EC2 Instance Credentials] ( ./aws.credential-access.ec2-steal-instance-credentials.md )
85
+
86
+ - [ Retrieve a High Number of Secrets Manager secrets (Batch)] ( ./aws.credential-access.secretsmanager-batch-retrieve-secrets.md )
87
+
88
+ - [ Retrieve a High Number of Secrets Manager secrets] ( ./aws.credential-access.secretsmanager-retrieve-secrets.md )
89
+
90
+ - [ Retrieve And Decrypt SSM Parameters] ( ./aws.credential-access.ssm-retrieve-securestring-parameters.md )
91
+
36
92
37
93
## Discovery
94
+
95
+ - [ Execute Discovery Commands on an EC2 Instance] ( ./aws.discovery.ec2-enumerate-from-instance.md )
96
+
97
+ - [ Download EC2 Instance User Data] ( ./aws.discovery.ec2-download-user-data.md )
98
+
99
+ - [ Enumerate SES] ( ./aws.discovery.ses-enumerate.md )
100
+
38
101
39
- - [ Execute Discovery Commands on an EC2 Instance] ( ./aws.discovery.ec2-enumerate-from-instance.md )
40
-
41
- - [ Download EC2 Instance User Data] ( ./aws.discovery.ec2-download-user-data.md )
42
-
43
- - [ Enumerate SES] ( ./aws.discovery.ses-enumerate.md )
44
-
45
-
46
- ## Execution
47
-
48
- - [ Launch Unusual EC2 instances] ( ./aws.execution.ec2-launch-unusual-instances.md )
49
-
50
- - [ Execute Commands on EC2 Instance via User Data] ( ./aws.execution.ec2-user-data.md )
51
-
52
- - [ Usage of ssm: SendCommand on multiple instances] ( ./aws.execution.ssm-send-command.md )
53
-
54
- - [ Usage of ssm: StartSession on multiple instances] ( ./aws.execution.ssm-start-session.md )
55
-
102
+ ## Lateral Movement
103
+
104
+ - [ Usage of EC2 Serial Console to push SSH public key] ( ./aws.lateral-movement.ec2-serial-console-send-ssh-public-key.md )
105
+
106
+ - [ Usage of EC2 Instance Connect on multiple instances] ( ./aws.lateral-movement.ec2-instance-connect.md )
107
+
56
108
57
109
## Exfiltration
58
-
59
- - [ Open Ingress Port 22 on a Security Group] ( ./aws.exfiltration.ec2-security-group-open-port-22-ingress.md )
60
-
61
- - [ Exfiltrate an AMI by Sharing It] ( ./aws.exfiltration.ec2-share-ami.md )
62
-
63
- - [ Exfiltrate EBS Snapshot by Sharing It] ( ./aws.exfiltration.ec2-share-ebs-snapshot.md )
64
-
65
- - [ Exfiltrate RDS Snapshot by Sharing] ( ./aws.exfiltration.rds-share-snapshot.md )
66
-
67
- - [ Backdoor an S3 Bucket via its Bucket Policy] ( ./aws.exfiltration.s3-backdoor-bucket-policy.md )
68
-
110
+
111
+ - [ Open Ingress Port 22 on a Security Group] ( ./aws.exfiltration.ec2-security-group-open-port-22-ingress.md )
112
+
113
+ - [ Exfiltrate an AMI by Sharing It] ( ./aws.exfiltration.ec2-share-ami.md )
114
+
115
+ - [ Exfiltrate EBS Snapshot by Sharing It] ( ./aws.exfiltration.ec2-share-ebs-snapshot.md )
116
+
117
+ - [ Exfiltrate RDS Snapshot by Sharing] ( ./aws.exfiltration.rds-share-snapshot.md )
118
+
119
+ - [ Backdoor an S3 Bucket via its Bucket Policy] ( ./aws.exfiltration.s3-backdoor-bucket-policy.md )
120
+
69
121
70
122
## Impact
71
-
72
- - [ Invoke Bedrock Model] ( ./aws.impact.bedrock-invoke-model.md )
73
-
74
- - [ S3 Ransomware through batch file deletion] ( ./aws.impact.s3-ransomware-batch-deletion.md )
75
-
76
- - [ S3 Ransomware through client-side encryption] ( ./aws.impact.s3-ransomware-client-side-encryption.md )
77
-
78
- - [ S3 Ransomware through individual file deletion] ( ./aws.impact.s3-ransomware-individual-deletion.md )
79
-
80
-
81
- ## Initial Access
82
-
83
- - [ Console Login without MFA] ( ./aws.initial-access.console-login-without-mfa.md )
84
-
85
-
86
- ## Lateral Movement
87
-
88
- - [ Usage of EC2 Serial Console to push SSH public key] ( ./aws.lateral-movement.ec2-serial-console-send-ssh-public-key.md )
89
-
90
- - [ Usage of EC2 Instance Connect on multiple instances] ( ./aws.lateral-movement.ec2-instance-connect.md )
91
-
92
-
93
- ## Persistence
94
-
95
- - [ Backdoor an IAM Role] ( ./aws.persistence.iam-backdoor-role.md )
96
-
97
- - [ Create an Access Key on an IAM User] ( ./aws.persistence.iam-backdoor-user.md )
98
-
99
- - [ Create an administrative IAM User] ( ./aws.persistence.iam-create-admin-user.md )
100
-
101
- - [ Create a backdoored IAM Role] ( ./aws.persistence.iam-create-backdoor-role.md )
102
-
103
- - [ Create a Login Profile on an IAM User] ( ./aws.persistence.iam-create-user-login-profile.md )
104
-
105
- - [ Backdoor Lambda Function Through Resource-Based Policy] ( ./aws.persistence.lambda-backdoor-function.md )
106
-
107
- - [ Add a Malicious Lambda Extension] ( ./aws.persistence.lambda-layer-extension.md )
108
-
109
- - [ Overwrite Lambda Function Code] ( ./aws.persistence.lambda-overwrite-code.md )
110
-
111
- - [ Create an IAM Roles Anywhere trust anchor] ( ./aws.persistence.rolesanywhere-create-trust-anchor.md )
112
-
113
- - [ Generate temporary AWS credentials using GetFederationToken] ( ./aws.persistence.sts-federation-token.md )
114
-
115
-
116
- ## Privilege Escalation
117
-
118
- - [ Execute Commands on EC2 Instance via User Data] ( ./aws.execution.ec2-user-data.md )
119
-
120
- - [ Create an Access Key on an IAM User] ( ./aws.persistence.iam-backdoor-user.md )
121
-
122
- - [ Create an administrative IAM User] ( ./aws.persistence.iam-create-admin-user.md )
123
-
124
- - [ Create a Login Profile on an IAM User] ( ./aws.persistence.iam-create-user-login-profile.md )
125
-
126
- - [ Add a Malicious Lambda Extension] ( ./aws.persistence.lambda-layer-extension.md )
127
-
128
- - [ Create an IAM Roles Anywhere trust anchor] ( ./aws.persistence.rolesanywhere-create-trust-anchor.md )
129
-
130
- - [ Change IAM user password] ( ./aws.privilege-escalation.iam-update-user-login-profile.md )
131
-
123
+
124
+ - [ Invoke Bedrock Model] ( ./aws.impact.bedrock-invoke-model.md )
125
+
126
+ - [ S3 Ransomware through batch file deletion] ( ./aws.impact.s3-ransomware-batch-deletion.md )
127
+
128
+ - [ S3 Ransomware through client-side encryption] ( ./aws.impact.s3-ransomware-client-side-encryption.md )
129
+
130
+ - [ S3 Ransomware through individual file deletion] ( ./aws.impact.s3-ransomware-individual-deletion.md )
131
+
0 commit comments