<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Lambda on security ?!</title><link>https://adicpnn.com/tags/lambda/</link><description>Recent content in Lambda on security ?!</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Thu, 12 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://adicpnn.com/tags/lambda/index.xml" rel="self" type="application/rss+xml"/><item><title>Cloudfoxable - Furls1</title><link>https://adicpnn.com/blog/cloudfoxable/furls1/</link><pubDate>Thu, 12 Mar 2026 00:00:00 +0000</pubDate><guid>https://adicpnn.com/blog/cloudfoxable/furls1/</guid><description>&lt;!-- raw HTML omitted --&gt;
&lt;p&gt;A Lambda function URL can be used to expose a Lambda function to the internet without an API gateway or another load balancer. This is really handy for builders, but can also be really handy for offensive security folk, as it&amp;rsquo;s ripe for misconfiguration.&lt;/p&gt;
&lt;p&gt;Use cloudfox to find the furls1 FunctionURL and find the flag.&lt;/p&gt;
&lt;!-- raw HTML omitted --&gt;
&lt;h3 id="information-gathering"&gt;Information Gathering&lt;/h3&gt;
&lt;p&gt;I&amp;rsquo;ll start off by enumerating the lambda functions in this account.&lt;/p&gt;</description></item><item><title>Cloudfoxable - Furls2</title><link>https://adicpnn.com/blog/cloudfoxable/furls2/</link><pubDate>Thu, 12 Mar 2026 00:00:00 +0000</pubDate><guid>https://adicpnn.com/blog/cloudfoxable/furls2/</guid><description>&lt;!-- raw HTML omitted --&gt;
&lt;p&gt;This Lambda Function URL doesn&amp;rsquo;t just give you the key like furls1. You have to work a little harder for this one. CloudFox can definitely help you here.&lt;/p&gt;
&lt;!-- raw HTML omitted --&gt;
&lt;h3 id="information-gathering"&gt;Information Gathering&lt;/h3&gt;
&lt;p&gt;This time around, I don&amp;rsquo;t know which lambda function to target, since there&amp;rsquo;s no &amp;ldquo;furls2&amp;rdquo; function. Instead, I will list all the function URLs in the AWS account. (minus the one I&amp;rsquo;ve already exploited)&lt;/p&gt;</description></item><item><title>Cloudfoxable - The topic is execution</title><link>https://adicpnn.com/blog/cloudfoxable/execution/</link><pubDate>Thu, 12 Mar 2026 00:00:00 +0000</pubDate><guid>https://adicpnn.com/blog/cloudfoxable/execution/</guid><description>&lt;!-- raw HTML omitted --&gt;
&lt;p&gt;You&amp;rsquo;ve just gained access to the role viniciusjr. At first glance, this role appears to only have some SNS read-only access? But I don&amp;rsquo;t think that&amp;rsquo;s accurate. See if you can get to the flag /cloudfoxable/flag/executioner in the SSM parameter store.&lt;/p&gt;
&lt;!-- raw HTML omitted --&gt;
&lt;h3 id="information-gathering"&gt;Information Gathering&lt;/h3&gt;
&lt;p&gt;First things first, set up the profile, and test access.&lt;/p&gt;
&lt;div class="highlight"&gt;&lt;div class="chroma"&gt;
&lt;table class="lntable"&gt;&lt;tr&gt;&lt;td class="lntd"&gt;
&lt;pre tabindex="0" class="chroma"&gt;&lt;code&gt;&lt;span class="lnt"&gt; 1
&lt;/span&gt;&lt;span class="lnt"&gt; 2
&lt;/span&gt;&lt;span class="lnt"&gt; 3
&lt;/span&gt;&lt;span class="lnt"&gt; 4
&lt;/span&gt;&lt;span class="lnt"&gt; 5
&lt;/span&gt;&lt;span class="lnt"&gt; 6
&lt;/span&gt;&lt;span class="lnt"&gt; 7
&lt;/span&gt;&lt;span class="lnt"&gt; 8
&lt;/span&gt;&lt;span class="lnt"&gt; 9
&lt;/span&gt;&lt;span class="lnt"&gt;10
&lt;/span&gt;&lt;span class="lnt"&gt;11
&lt;/span&gt;&lt;span class="lnt"&gt;12
&lt;/span&gt;&lt;span class="lnt"&gt;13
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/td&gt;
&lt;td class="lntd"&gt;
&lt;pre tabindex="0" class="chroma"&gt;&lt;code class="language-bash" data-lang="bash"&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;adicpnn@laboratory cloud % cat ~/.aws/config &lt;span class="p"&gt;|&lt;/span&gt; tail
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;&lt;span class="o"&gt;[&lt;/span&gt;profile vini&lt;span class="o"&gt;]&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;&lt;span class="nv"&gt;region&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; eu-central-1
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;&lt;span class="nv"&gt;role_arn&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; arn:aws:iam::129323993607:role/viniciusjr
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;&lt;span class="nv"&gt;source_profile&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; cloudfoxable
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;adicpnn@laboratory cloud % aws sts get-caller-identity --profile vini
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;&lt;span class="o"&gt;{&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt; &lt;span class="s2"&gt;&amp;#34;UserId&amp;#34;&lt;/span&gt;: &lt;span class="s2"&gt;&amp;#34;AROAR4HCPRIDXMLFGL22G:botocore-session-1773327029&amp;#34;&lt;/span&gt;,
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt; &lt;span class="s2"&gt;&amp;#34;Account&amp;#34;&lt;/span&gt;: &lt;span class="s2"&gt;&amp;#34;129323993607&amp;#34;&lt;/span&gt;,
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt; &lt;span class="s2"&gt;&amp;#34;Arn&amp;#34;&lt;/span&gt;: &lt;span class="s2"&gt;&amp;#34;arn:aws:sts::129323993607:assumed-role/viniciusjr/botocore-session-1773327029&amp;#34;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;&lt;span class="o"&gt;}&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;p&gt;Then, enumerating attached policies.&lt;/p&gt;</description></item></channel></rss>