You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We would like an easy way of persisting AWS SECRET_ACCESS_KEY / ACCESS_KEY_ID / REGION information in Metasploit's database. We would need similar mechanism for GCP/Azure.
I think that this may be non-trivial to do correctly:
For normal "users" of those clouds - keys might be enough, but for us, pivots can mean role assumptions and hijacked session init URLs (SSM/IC/etc) or tokens provide "intermediate" credentials for accessing resources (legitimately or otherwise).
I think we may want to sketch an MDM model for this sort of thing first and wargame how we could use that a bit before we start hacking up the data model which we may later need to expand.
We would like an easy way of persisting AWS
SECRET_ACCESS_KEY
/ACCESS_KEY_ID
/REGION
information in Metasploit's database. We would need similar mechanism for GCP/Azure.This would integrate well with:
The text was updated successfully, but these errors were encountered: