aws-penetration-testing
Perform AWS Penetration Testing and Security Assessment
Organizations need to validate their AWS cloud security posture against real-world attack techniques. This skill provides authorized security teams with comprehensive methodologies for IAM enumeration, SSRF exploitation testing, S3 bucket assessment, and privilege escalation detection.
Descargar el ZIP de la skill
Subir en Claude
Ve a Configuración → Capacidades → Skills → Subir skill
Activa y empieza a usar
Pruébalo
Usando "aws-penetration-testing". Enumerate current IAM identity and permissions
Resultado esperado:
Identity: arn:aws:iam::ACCOUNT:user/test-user
Attached Policies: AmazonS3ReadOnlyAccess, CloudWatchLogsReadOnly
Inline Policies: None
Escalation Risk: LOW - No privilege escalation permissions detected
Usando "aws-penetration-testing". Check S3 bucket public access configuration
Resultado esperado:
Bucket: company-assets
Public Access Block: Enabled
Bucket Policy: Denies public access
ACL: Bucket-owner-enforced
Status: SECURE - No public access vectors identified
Usando "aws-penetration-testing". Test metadata endpoint accessibility
Resultado esperado:
IMDS Version: IMDSv2 enabled
Token Required: Yes
Metadata Access: Protected
Status: SECURE - IMDSv2 token requirement prevents SSRF exploitation
Auditoría de seguridad
Riesgo altoStatic analysis detected 287 patterns across 2 files (881 lines). Most findings are FALSE POSITIVEs because files contain Markdown documentation (not executable code). However, content includes sensitive offensive security techniques (SSRF exploitation, privilege escalation, persistence mechanisms) requiring explicit authorization warnings. Recommend: publish with prominent authorization disclaimers and user acknowledgment requirements.
Problemas de riesgo alto (3)
Problemas de riesgo medio (3)
Problemas de riesgo bajo (2)
Factores de riesgo
⚙️ Comandos externos (3)
🌐 Acceso a red (3)
📁 Acceso al sistema de archivos (2)
🔑 Variables de entorno (1)
Patrones detectados
Puntuación de calidad
Lo que puedes crear
Authorized Red Team Engagement
Security consultants performing authorized penetration testing against client AWS environments to identify misconfigurations and privilege escalation paths before malicious actors exploit them.
Cloud Security Audit
Internal security teams assessing their organization's AWS security posture against known attack techniques to validate defensive controls and monitoring capabilities.
Security Research and Training
Security researchers and students learning AWS attack techniques in controlled lab environments (AWSGoat, CloudGoat) to improve defensive security skills.
Prueba estos prompts
Help me enumerate IAM permissions for the current AWS identity. I have authorized access and need to document what permissions this identity has. Start with sts get-caller-identity and show me how to list attached policies.
I need to assess S3 bucket configurations for public access vulnerabilities. Show me the AWS CLI commands to list buckets, check bucket policies, and identify publicly accessible objects in our authorized test environment.
We're testing our web application for SSRF vulnerabilities that could access AWS metadata endpoints. Document the IMDSv1 and IMDSv2 techniques so we can verify our instance metadata protection controls are working.
Analyze the IAM permissions we've enumerated and identify potential privilege escalation paths. Check for dangerous permissions like iam:CreateAccessKey, iam:AttachUserPolicy, and lambda:UpdateFunctionCode that could lead to admin access.
Mejores prácticas
- Always obtain written authorization documenting scope, systems, and testing window before beginning any penetration testing activities
- Enable CloudTrail logging before testing begins and preserve all logs for post-engagement analysis and client reporting
- Use dedicated test credentials and avoid testing against production environments without explicit change approval and rollback procedures
Evitar
- Never test AWS resources outside the authorized scope - unauthorized access violates computer crime laws even with good intentions
- Do not disable security controls (CloudTrail, GuardDuty, Security Hub) permanently - temporary bypasses must be documented and restored
- Avoid leaving persistent backdoors or access mechanisms after engagement completion - all test artifacts must be removed during cleanup
Preguntas frecuentes
What authorization do I need before using this skill?
Can this skill execute AWS commands automatically?
Is it legal to test AWS services I don't own?
What tools do I need to use this skill effectively?
How do I prevent GuardDuty alerts during testing?
What cleanup is required after testing?
Detalles del desarrollador
Autor
sickn33Licencia
MIT
Repositorio
https://github.com/sickn33/antigravity-awesome-skills/tree/main/skills/aws-penetration-testingRef.
main
Estructura de archivos