AMI Files
AMI file to EC2 compromise
Restore the EC2 instance using the exposed AMI file. You will receive a JSON response with an ImageId
key and value. Store the value because it will be needed to start the instance.
Create a new SSH key pair
Get information about subnets and security groups
If the subnet does not contain a security rule that allows SSH access run the following commands
Create a new EC2 instance with SSH access. Add the generated key to the new instance. If the operation is successful you will receive a JSON response with the information related to the new EC2 instance. Store the InstanceId
value as reference to the new instance.
Get the public ip address of the instance
Connect to the instance via SSH
Last updated