Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Feature Request - Add support for persisting cloud creds #175

Open
adfoster-r7 opened this issue May 17, 2023 · 1 comment
Open

Feature Request - Add support for persisting cloud creds #175

adfoster-r7 opened this issue May 17, 2023 · 1 comment

Comments

@adfoster-r7
Copy link
Contributor

We would like an easy way of persisting AWS SECRET_ACCESS_KEY / ACCESS_KEY_ID / REGION information in Metasploit's database. We would need similar mechanism for GCP/Azure.

This would integrate well with:

@sempervictus
Copy link

I think that this may be non-trivial to do correctly:
For normal "users" of those clouds - keys might be enough, but for us, pivots can mean role assumptions and hijacked session init URLs (SSM/IC/etc) or tokens provide "intermediate" credentials for accessing resources (legitimately or otherwise).
I think we may want to sketch an MDM model for this sort of thing first and wargame how we could use that a bit before we start hacking up the data model which we may later need to expand.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants