Beginner Lab
aws
Abuse Unauthenticated API to Leak Data
Exploit a misconfigured private AWS API Gateway and pivot form recon to initial access, and see how far you can go!
Scenario
Huge Logistics recently launched a private bug bounty program, allowing trusted security professionals to assess the security of their internal web applications. If you manage to compromise an application, the terms of the program allow you to try and increase your access to other resources. Your scraping of the bug bounty page revealed that a new IP address has been added to the in-scope assets. You've already uncovered a Python script by curling the new IP, which exposes certain secrets. Now it’s time to probe the IP and try to claim a bounty!
Lab prerequisites
- Basic understanding of AWS CLI Commands
- Basic understanding of AWS services
- Familiarity with web reconnaissance
- Familiarity with Git commands
Learning outcomes
- Identify sentitive information in client-side code
- Pivot to internal network access.
- Abuse API Gateway misconfiguration to leak data
- Learn how the scenario could have been prevented
Real-world context
This lab mirrors a real-world attack scenario, demonstrating how adversaries may exploit API Gateway misconfigurations. Companies driven by pressures to quickly release new features may inadvertently overlook best security practices. For instance, the 2022 T-Mobile breach occurred when attackers exploited an API Gateway endpoint lacking authentication, resulting in unauthorized access to millions of customer records. Similarly, Optus experienced a significant breach via an exposed, unauthenticated test API endpoint, enabling attackers to harvest sensitive data.
Cloud Security Training To Protect Your Business
Pwned Labs for Business gives your team access to dedicated business content, including labs and cyber ranges.
We also offer in-person or remote workshops, and our cloud penetration services are helping businesses become more secure!