☁️ CloudCtrl Dashboard

PRACIVO LAB — INTENTIONALLY VULNERABLE
⚠️ Pracivo Security Lab — Exposed AWS keys in /api/config, S3 listing without auth, IMDS simulation, IAM misconfig.

IMDS — Instance Metadata Service Simulation

Simulates AWS IMDS at 169.254.169.254. In SSRF attacks, the server is tricked into fetching this endpoint.
Current path: /latest/meta-data/iam/security-credentials/ec2-role

{"Code":"Success","Type":"AWS-HMAC","AccessKeyId":"ASIAIOSFODNN7EXAMPLE","SecretAccessKey":"wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY","Token":"FakeSessionTokenABC123XYZ","Expiration":"2024-12-31T23:59:59Z"}
Root IAM Credentials Instance ID Internal IP

In a real SSRF attack: make the vulnerable server (like /webhook on port 8085) fetch http://169.254.169.254/latest/meta-data/iam/security-credentials/ec2-role