AWS Linux Forensics PoC
Just a proof of concept but this script does the following:
- Makes a copy (AMI) of an infected host
- Launches a test instance (of the same type) with the new AMI
- Runs a bunch of commands (install git, download Lime, and Make .ko file)
- Uploads the .ko file to S3.
- Downloads the .ko to the infected host, is loaded into memory and executes to output a memory dump
- A hash is generated and uploaded along with the memory dump to s3.
- Terminates the test instance
- Thank the demo gods?
After talking with a buddy, I think I want to go a much more efficient route (more to come soon). This was just a fun PoC to practice using waiters and wanted to get more experience using SSM.
Cheers!
P.S. You might be able to squeeze this logic in the previous forensics tutorial for Windows? (check the previous repo)