An open API service indexing awesome lists of open source software.

https://github.com/m6a-UdS/dvca

Damn Vulnerable Cloud Application
https://github.com/m6a-UdS/dvca

Last synced: 23 days ago
JSON representation

Damn Vulnerable Cloud Application

Awesome Lists containing this project

README

        

# Damn Vulnerable Cloud Application
This is a demonstration project to show how to do privilege escalation on AWS. DO NOT deploy this on an AWS account unless you know very well what you are doing!

## Implemented Cloud Providers & Vulnerabilities
More details about how to use it are available on my [blog](https://medium.com/poka-techblog/privilege-escalation-in-the-cloud-from-ssrf-to-global-account-administrator-fd943cf5a2f6). For now, it's very AWS-centric, but the frontend is completely agnostic to the backend's technology, so if you want to contribute with a backend using other Cloud providers, I gladly accept PRs.

## Prerequisites
- A domain name managed by AWS
- The ACM Certificate ID associated to this domain
- A Wildcard Certificate associated to this domain
- The Hosted Zone ID associated to this domain

## Deployment
_In theory_, you should be able to deploy the Damn Vulnerable Cloud Application with a simple command:
```
make all DOMAIN_NAME= \
ROOT_CERTIFICATE= \
CERTIFICATE= \
HOSTED_ZONE=
```

But the project is modular, so you could also deploy it in multiple steps. Typical `make` resources would be: prerequisites, frontend and a backend of your choice
```
make prerequisites DOMAIN_NAME= \
CERTIFICATE= \
HOSTED_ZONE=
make frontend DOMAIN_NAME= \
ROOT_CERTIFICATE= \
HOSTED_ZONE=
make fargate DOMAIN_NAME= \
CERTIFICATE= \
HOSTED_ZONE=
```
Just be careful: The frontend needs your root domain Certificate ID for the CloudFront distribution, while the rest just needs your wildcard Certificate ID

In the end, you should end-up with something like this :-)

![DVCA](https://raw.githubusercontent.com/m6a-UdS/dvca/master/img/DVCA.png)