CloudCopy Logo

CloudCopy

0
Free
Visit Website

This tool implements a cloud version of the Shadow Copy attack against domain controllers running in AWS. Any AWS user possessing the EC2:CreateSnapshot permission can steal the hashes of all domain users by creating a snapshot of the Domain Controller mounting it to an instance they control and exporting the NTDS.dit and SYSTEM registry hive file for use with Impacket's secretsdump project. Demos CloudCopy in Profile mode running against an AWS Domain Controller with an unencrypted Volume. CloudCopy in Manual mode running against an AWS Domain Controller with an encrypted Volume. Detailed CloudCopy Algorithm: Load AWS CLI with Victim Credentials that have at least CreateSnapshot permissions. Run 'Describe-Instances' and show in list for attacker to select. Run 'Create-Snapshot' on volume of selected instance. Run 'modify-snapshot-attribute' on new snapshot to set 'createVolumePermission' to attacker AWS Account. Load AWS CLI with Attacker Credentials. Run 'run-instance' command to create new Linux EC2 with our stolen snapshot. SSH run 'sudo mkdir /windows'. SSH run 'sudo mount /dev/xvdf1 /windows/'. SSH run 'sudo cp /windows/Windows/NTDS/ntds.dit /home/ec2-user'. SSH run 'sudo cp /w

FEATURES

ALTERNATIVES

A command-line tool to get valuable information out of AWS CloudTrail and a general purpose toolbox for working with IAM policies

CloudScraper is a tool for enumerating cloud resources, including S3 Buckets, Azure Blobs, and Digital Ocean Storage Space.

A cloud native application protection platform that provides security monitoring and protection across cloud, on-premises, and hybrid environments.

Commercial

A project exploring minimal set of restrictions for running untrusted code using Linux containers in a concise codebase.

A customized AWS EKS setup for PCI-DSS, SOC2, and HIPAA compliance

Open-source cloud-agnostic resource manager for analyzing and managing cloud cost, usage, security, and governance.

In-depth analysis and insights on various cloud security topics by Rhino Security Labs team

Open source multi-cloud security-auditing tool for assessing security posture of cloud environments.

PINNED