Join the Hack Smarter community: hacksmarter.org
--- In this video, I demonstrate the process of completing the "Pwn TeamCity in the Cloud" Lab from Pwned Labs.
I utilize CVE-2024-27198 to gain initial access, an exploit currently being employed by threat actors, to highlight the critical need for patching your TeamCity instances.
Additionally, I showcase the following techniques:
- Accessing and utilizing EC2 instance user data
- Employing Pacu for IAM Permissions brute-forcing
- Gaining server shell access through a TeamCity terminal
- Decrypting TeamCity secrets
- Conducting S3 enumeration
- Understanding measures to prevent such attacks
Enjoy watching!
16 июл 2024