🥣 Secret SauceEach week, we'll showcase your top AWS insights, focusing on AWS Security tricks and tips. Got a cool command-line hack, a clever console maneuver, or an awesome open-source tool? Send us your best tips for a shot at being featured in our upcoming issues.Are you red teaming an AWS environment? Be careful what operating system you use! Those IAM credentials you stole might get you caught.
Here's how: When you interact with the AWS API, a user-agent is sent in the request. This provides an opportunity for savvy defenders to catch lazy attackers. Why would IAM credentials for an EC2 instance suddenly start using a Mac user-agent? GuardDuty, AWS's own threat detection service, has a detection like this for common Penetration Testing Linux Distributions.
Avoid using Kali, Parrot, or Pentoo Linux to bypass this GuardDuty detection. To see the relevant part of the user-agent your operating system will report, you can run the following one liner:
$ python3 -c "import platform; print(platform.system(), platform.release())"
Nick Frichette is a senior security researcher at Datadog where he specializes in AWS offensive security and vulnerability research. He has found numerous vulnerabilities in AWS services and is the creator of Hacking the Cloud, an open-source encyclopedia of cloud-focused offensive security techniques.