Skip to content

Commit 8f9e898

Browse files
authored
Update aws-sagemaker-persistence.md
1 parent 00993ed commit 8f9e898

File tree

1 file changed

+0
-2
lines changed

1 file changed

+0
-2
lines changed

src/pentesting-cloud/aws-security/aws-persistence/aws-sagemaker-persistence.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,6 @@
22

33
{{#include ../../../banners/hacktricks-training.md}}
44

5-
# AWS - SageMaker Lifecycle Configuration Persistence
6-
75
## Overview of Persistence Techniques
86

97
This section outlines methods for gaining persistence in SageMaker by abusing Lifecycle Configurations (LCCs), including reverse shells, cron jobs, credential theft via IMDS, and SSH backdoors. These scripts run with the instance’s IAM role and can persist across restarts. Most techniques require outbound network access, but usage of services on the AWS control plane can still allow success if the environment is in 'VPC-only" mode.

0 commit comments

Comments
 (0)