Identify publicly shared RDS database snapshots belonging to a known AWS account, restore them into an attacker-controlled account, and extract sensitive data.
🧭 Attack Flow (Generic Steps)
-
Start with Target AWS Account ID
-
Obtain through passive recon, cloud asset leaks, public repos, etc.
-
-
Search for Public RDS Snapshots
-
Use AWS CLI to enumerate RDS snapshots with
--snapshot-type public -
Filter results by snapshot owner (Account ID)
-
-
Check if Snapshot is Unencrypted
-
If
"Encrypted": false, snapshot can be restored by anyone -
If
"Encrypted": true, restoration is only possible with access to the related KMS key (rare)
-
-
Copy the Snapshot to Attacker's Account
-
Snapshot must be copied before it can be restored
-
-
Restore Snapshot into New RDS Instance
-
Choose correct DB engine (
mysql,postgres, etc.) -
Optionally make it publicly accessible
-
-
Connect to Restored DB Instance
-
Use endpoint obtained via:
-
Connect using standard tools like:
-
-
Explore and Exfiltrate Data
-
Query internal tables
-
Look for credentials, PII, secrets, logs, etc.
-
Comments
Post a Comment