Skip to content

Commit

Permalink
renamed the lambda_sql_injection scenario to 'vulnerable_lambda' to g…
Browse files Browse the repository at this point in the history
…eneralize it so we can add more lambdas in the future. Updated the documentation to reflect this change. added information about this scenario to the main README.
  • Loading branch information
cmd-ctrl-freq committed Mar 14, 2022
1 parent b8d1263 commit d01153c
Show file tree
Hide file tree
Showing 1,459 changed files with 10 additions and 2 deletions.
8 changes: 8 additions & 0 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -89,6 +89,14 @@ $ docker run -it -v ~/.aws:/root/.aws/ rhinosecuritylabs/cloudgoat:latest

## Scenarios Available

### vulnerable_lambda (Small / Easy)

`$ ./cloudgoat.py create vulnerable_lambda`

In this scenario, you start as the 'bilbo' user. You will assume a role with more privelages, discover a lambda function that applies policies to users, and exploit a vulnerability in the function to escalate the privelages of the bilbo user in order to search for secrets.

[Visit Scenario Page.](scenarios/vulnerable_lambda/README.md)

### iam_privesc_by_rollback (Small / Easy)

`$ ./cloudgoat.py create iam_privesc_by_rollback`
Expand Down
Original file line number Diff line number Diff line change
@@ -1,10 +1,10 @@

# Scenario: lambda_injection_privesc
# Scenario: vulnerable_lambda

**Size:** Small
**Difficulty:** Easy

**Command:** `$ ./cloudgoat.py create lambda_injection_privesc`
**Command:** `$ ./cloudgoat.py create vulnerable_lambda`

## Scenario Resources

Expand Down
File renamed without changes.
File renamed without changes.
Loading

0 comments on commit d01153c

Please sign in to comment.