mirror of
https://github.com/HackTricks-wiki/hacktricks-cloud.git
synced 2025-12-12 07:40:49 -08:00
Update aws-sagemaker-persistence.md
This commit is contained in:
@@ -2,8 +2,6 @@
|
||||
|
||||
{{#include ../../../banners/hacktricks-training.md}}
|
||||
|
||||
# AWS - SageMaker Lifecycle Configuration Persistence
|
||||
|
||||
## Overview of Persistence Techniques
|
||||
|
||||
This section outlines methods for gaining persistence in SageMaker by abusing Lifecycle Configurations (LCCs), including reverse shells, cron jobs, credential theft via IMDS, and SSH backdoors. These scripts run with the instance’s IAM role and can persist across restarts. Most techniques require outbound network access, but usage of services on the AWS control plane can still allow success if the environment is in 'VPC-only" mode.
|
||||
|
||||
Reference in New Issue
Block a user