New attack technique: Persistence through federation #604
+435
−0
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
What does this PR do?
Motivation
I saw that this was an open and prioritized issue: #313
The current implementation creates an IAM user and a pair of access keys, one enabled and the other disabled. I use the enabled credentials to call the GetFederationToken API. This is not done directly from the credentials used in the Stratus Red Team session because GetFederationToken generates temporary security credentials for a user. If you're using a role to execute Stratus Red Team, this approach likely won't work. Instead, using the credentials of the IAM user created during the warmup phase allows us to successfully reproduce the GetFederationToken step.
Afterward, I only call the sts:GetCallerIdentity API to verify that the session works. I am not re-enabling the disabled access keys, as this requires interaction with the AWS Management Console.
Checklist