SkyWrapper : Tool To Discover Suspicious Creation Forms

SkyWrapper is an open-source project which analyzes behaviors of temporary tokens created in a given AWS account. The tool is aiming to find suspicious creation forms and uses of temporary tokens to detect malicious activity in the account.

The tool analyzes the AWS account, and creating an excel sheet includes all the currently living temporary tokens. A summary of the finding printed to the screen after each run.

Usage

  • Fill the required data in the config file
  • Make sure your users have the satisfied permissions for running the script (You can check this in the IAM at the summary page of the user)
  • Run the python script

python SkyWrapper.py

Also Read – Pwned : Simple CLI Script To Check If You Have A Password

Permissions

For running this script, you will need at least the following permissions policy:

{
“Version”: “2012-10-17”,
“Statement”: [
{
“Sid”: “S3TrailBucketPermissions”,
“Effect”: “Allow”,
“Action”: [
“s3:GetObject”,
“s3:ListBucketMultipartUploads”,
“s3:ListBucket”,
“s3:GetBucketLocation”,
“s3:ListMultipartUploadParts”
],
“Resource”: [
“arn:aws:s3:::{cloudtrail_bucket_name}/“, “arn:aws:s3:::{cloudtrail_bucket_name} ] }, { “Sid”: “IAMReadPermissions”, “Effect”: “Allow”, “Action”: [ “iam:ListAttachedRolePolicies”, “iam:ListRolePolicies”, “iam:GetRolePolicy”, “iam:GetPolicyVersion”, “iam:GetPolicy”, “iam:ListRoles” ], “Resource”: [ “arn:aws:iam:::policy/“, “arn:aws:iam:::role/” ] }, { “Sid”: “GLUEReadWritePermissions”, “Effect”: “Allow”, “Action”: [ “glue:CreateTable”, “glue:CreateDatabase”, “glue:GetTable”, “glue:GetDatabase” ], “Resource”: “
},
{
“Sid”: “CLOUDTRAILReadPermissions”,
“Effect”: “Allow”,
“Action”: [
“cloudtrail:DescribeTrails”
],
“Resource”: “” }, { “Sid”: “ATHENAReadPermissions”, “Effect”: “Allow”, “Action”: [ “athena:GetQueryResults”, “athena:StartQueryExecution”, “athena:GetQueryExecution” ], “Resource”: “arn:aws:athena:::workgroup/
},
{
“Sid”: “S3AthenaResultsBucketPermissions”,
“Effect”: “Allow”,
“Action”: [
“s3:PutObject”,
“s3:GetObject”,
“s3:ListBucketMultipartUploads”,
“s3:CreateBucket”,
“s3:ListBucket”,
“s3:GetBucketLocation”,
“s3:ListMultipartUploadParts”
],
“Resource”: “arn:aws:s3:::aws-athena-query-results-*”
}
]
}

  • Make sure you change the “{trail_bucket}” with your trail’s bucket name!

In case you have more than one trail, which you want to use the script also on them, you have to add them as well to the policy permissions resource section.

Configuration

“config.yaml” is the configuration file. In most cases, you can leave the configuration as is. In case you need to change it, the configuration file is documented.

athena: # Athena configuration
database_name: default # The name of the database Athena uses for querying the trail bucket.
table_name: cloudtrail_logs_{table_name} # The table name of the trail bucket name
output_location: s3://aws-athena-query-results-{account_id}-{region}/ # The default output location bucket for the query results
output:
excel_output_file: run_results_{trail}{account_id}-{date}.xlsx # Excel results file summary_output_file: run_summary{trail}_{account_id}-{date}.txt # Summary text results file
verify_https: True # Enable/ Disable verification of SSL certificates for HTTP requests
account:
account_id: 0 # The account id – Keep it as 0 in case you don’t know it
aws_access_key_id: # If you keep it empty, the script will look after the default AWS credentials stored in ~/.aws/credentials
aws_secret_access_key: # If you keep it empty, the script will look after the default AWS credentials stored in ~/.aws/credentials
aws_session_token: # If you keep it empty, the script will look after the default AWS credentials stored in ~/.aws/credentials

References

For more comments, suggestions, or questions, you can contact Omer Tsarfati (@OmerTsarfati) and CyberArk Labs. You can find more projects developed by us in https://github.com/cyberark/.

R K

Recent Posts

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

1 week ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

2 weeks ago

Red Team Certification – A Comprehensive Guide To Advancing In Cybersecurity Operations

Embark on the journey of becoming a certified Red Team professional with our definitive guide.…

3 weeks ago

CVE-2024-5836 / CVE-2024-6778 : Chromium Sandbox Escape via Extension Exploits

This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…

3 weeks ago

Rust BOFs – Unlocking New Potentials In Cobalt Strike

This took me like 4 days (+2 days for an update), but I got it…

3 weeks ago

MaLDAPtive – Pioneering LDAP SearchFilter Parsing And Security Framework

MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…

3 weeks ago