Cloudgoat AWS CTF solution- Scenerio 7 (ecs_takeover)

n00🔑
8 min readOct 22, 2022

Scenerio 7 - ecs_takeover

Deployment:

git clone https://github.comdhinoSecurityLabs/cloudgoat.git
cd cloudgoat
chmod +x cloudgoat.py
./cloudgoat.py config whitelist --auto
./cloudgoat.py create ecs_takeover

Note: If vuln-site(“ec2–54–80–208–45.compute-1.amazonaws.com”) is npt accessible, you may need to edit the security group inbound policy and allow every IPv4 address(0.0.0.0/0) or your current public IP OR run ./cloudgoat.py config whitelist --autobefore deploying the lab.

Scenario Resources

  • 1 VPC and Subnet with:
  • 2 EC2 Instances
  • 1 ECS Cluster
  • 3 ECS Services
  • 1 Internet Gateway

Scenario Start(s)

  1. Access the external website via the EC2 Instance’s public IP.

Scenario Goal(s)

Gain access to the “vault” container and retrieve the flag.

Summary

--

--