How to transfer files in AWS using SSM #195
Open
+61
−0
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
Exfiltration and Internal Service Access via AWS SSM Port Forwarding
This blog post details a method to exfiltrate files and access internal services on AWS EC2 instances via AWS Systems Manager (SSM) port forwarding, without requiring any inbound network changes.
Prerequisites
AmazonSSMManagedInstanceCore
)🔧 Technical Details
SSM Port Forwarding: Abuse the AWS-StartPortForwardingSession SSM document via the AWS CLI, specifying
portNumber
andlocalPortNumber
, to create a bidirectional TCP tunnel through the SSM agent without opening inbound firewall ports.Python HTTP Server Exfiltration: Serve arbitrary files on the EC2 instance by running
python3 -m http.server <port>
, then retrieve them locally over the established SSM tunnel wi...🤖 Agent Actions
Added new practical SSM port-forwarding techniques (file exfiltration, internal service access, 7z encryption, defensive controls) to the existing AWS EC2/EBS/SSM/VPC post-exploitation page and included a reference to the Pentest Partners blog.
✅ Review Checklist
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.