Below is an example scenario to demonstrate the usage of CCAT.
Starting with compromised AWS credentials, the attacker enumerates and explores ECR repositories. Then, the attacker found that they use NGINX Docker image and pulled that Docker image from ECR. Furthermore, the attacker creates a reverse shell backdoor into the target Docker image. Finally, the attacker pushes the backdoored Docker image to ECR.
-
The attacker explores the AWS environment and discovers they are able to list ECR repositories using compromised AWS credentials.
-
Enumerate ECR repositories
-
Then the attacker lists enumerated ECR repositories with simple table format
-
-
The attacker finds that they use the NGINX Docker image and pulls that Docker image from ECR.
-
The attacker decides to create a reverse shell backdoor into the pulled NGINX Docker image.
-
The attacker starts a listener for reverse shell
-
Then the attacker creates a reverse shell backdoor
This module generates a Dockerfile on the fly and builds new a Docker image.
-
Then the attacker will be promoted to provide repository name, tag and new build tag
-
Then the attacker generates a Dockerfile, adds reverse shell configuration, and overwrites the default CMD command
"CMD sets default command and/or parameters, which can be overwritten from command line when docker container runs."
-
Then the attacker reviews a Dockerfile and builds new backdoored NGINX Docker image
-
-
Then the attacker tests the backdoored Docker image
-
-
Finally, the attacker pushes the backdoored Docker image to ECR.