Serverless Services Exploitation
Dive deeper into compromised Lambda functions or API Gateway integrations to exfiltrate code/config or execute payloads.
- Enumerate Lambda Functions (see section 3.5).
- Download & Inspect Deployment Package (ZIP and
env
variables inside). - Identify Hardcoded Secrets or Misconfigurations (e.g., environment variables exposing DB credentials).
- Check Lambda Function Policy for βInvokeFunctionβ Permissions
- If an API Gateway or SQS/SNS resource has permission to invoke, you can craft requests to trigger the function with malicious payloads.
- For API Gateway: build the base URL from the ARN returned by
get-policy
and send HTTP requests to test for command injection or exposed functions.