Simulates AWS IMDS at 169.254.169.254. In SSRF attacks, the server is tricked into fetching this endpoint.
Current path: /latest/meta-data/iam/security-credentials/ec2-role
{"Code":"Success","Type":"AWS-HMAC","AccessKeyId":"ASIAIOSFODNN7EXAMPLE","SecretAccessKey":"wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY","Token":"FakeSessionTokenABC123XYZ","Expiration":"2024-12-31T23:59:59Z"}
In a real SSRF attack: make the vulnerable server (like /webhook on port 8085) fetch http://169.254.169.254/latest/meta-data/iam/security-credentials/ec2-role