Pillage Exposed RDS Instances
A walkthrough demonstrating how to exfiltrate data from a public RDS instance.
Overview
Pre-Requisites
Walkthrough
Discovering RDS
nmap -Pn -p3306,5432,1433,1521 exposed.cw9ow1llpfvz.eu-north-1.rds.amazonaws.com
Nmap scan report for exposed.cw9ow1llpfvz.eu-north-1.rds.amazonaws.com (16.171.94.68)
Host is up (0.16s latency).
rDNS record for 16.171.94.68: ec2-16-171-94-68.eu-north-1.compute.amazonaws.com
PORT STATE SERVICE
1433/tcp filtered ms-sql-s
1521/tcp filtered oracle
3306/tcp open mysql
5432/tcp filtered postgresql
Nmap done: 1 IP address (1 host up) scanned in 2.78 secondsBrute-Forcing MySQL
Exfiltrating Data
Wrap-Up
Last updated