AWS - Lightsail Enum
{{#include ../../../banners/hacktricks-training.md}}
AWS - Lightsail
Amazon Lightsail provides an easy, lightweight way for new cloud users to take advantage of AWSβ cloud computing services. It allows you to deploy common and custom web services in seconds via VMs (EC2) and containers.\
It's a minimal EC2 + Route53 + ECS.
Enumeration
# Instances
aws lightsail get-instances #Get all
aws lightsail get-instance-port-states --instance-name <instance_name> #Get open ports
# Databases
aws lightsail get-relational-databases
aws lightsail get-relational-database-snapshots
aws lightsail get-relational-database-parameters
# Disk & snapshots
aws lightsail get-instance-snapshots
aws lightsail get-disk-snapshots
aws lightsail get-disks
# More
aws lightsail get-load-balancers
aws lightsail get-static-ips
aws lightsail get-key-pairs
Analyse Snapshots
It's possible to generate instance and relational database snapshots from lightsail. Therefore you can check those the same way you can check EC2 snapshots and RDS snapshots.
Metadata
Metadata endpoint is accessible from lightsail, but the machines are running in an AWS account managed by AWS so you don't control what permissions are being granted. However, if you find a way to exploit those you would be directly exploiting AWS.
Privesc
{{#ref}}
../aws-privilege-escalation/aws-lightsail-privesc/README.md
{{#endref}}
Post Exploitation
{{#ref}}
../aws-post-exploitation/aws-lightsail-post-exploitation/README.md
{{#endref}}
Persistence
{{#ref}}
../aws-persistence/aws-lightsail-persistence/README.md
{{#endref}}
{{#include ../../../banners/hacktricks-training.md}}