Table of Contents generated with DocToc
- Sample queries
- What RDS instances are installed in my AWS accounts?
- Which RDS instances have encryption turned off?
- Which EC2 instances are exposed (directly or indirectly) to the internet?
- Which ELB LoadBalancers are internet accessible?
- Which ELBv2 LoadBalancerV2s (Application Load Balancers) are internet accessible?
- Which S3 buckets have a policy granting any level of anonymous access to the bucket?
- How many unencrypted RDS instances do I have in all my AWS accounts?
- What users have the TotallyFake Chrome extension installed?
- What users have installed extensions that are risky based on CRXcavator scoring?
MATCH (aws:AWSAccount)-[r:RESOURCE]->(rds:RDSInstance)
return *
Which RDS instances have encryption turned off?
MATCH (a:AWSAccount)-[:RESOURCE]->(rds:RDSInstance{storage_encrypted:false})
return a.name, rds.id
Which EC2 instances are exposed (directly or indirectly) to the internet?
MATCH (instance:EC2Instance{exposed_internet: true})
RETURN instance.instanceid, instance.publicdnsname
Which ELB LoadBalancers are internet accessible?
MATCH (elb:LoadBalancer{exposed_internet: true})—->(listener:ELBListener)
RETURN elb.dnsname, listener.port
ORDER by elb.dnsname, listener.port
Which ELBv2 LoadBalancerV2s (Application Load Balancers) are internet accessible?
MATCH (elbv2:LoadBalancerV2{exposed_internet: true})—->(listener:ELBV2Listener)
RETURN elbv2.dnsname, listener.port
ORDER by elbv2.dnsname, listener.port
Which S3 buckets have a policy granting any level of anonymous access to the bucket?
MATCH (s:S3Bucket)
WHERE s.anonymous_access = true
RETURN s
MATCH (a:AWSAccount)-[:RESOURCE]->(rds:RDSInstance)
WHERE rds.storage_encrypted = false
return a.name as AWSAccount, count(rds) as UnencryptedInstances
MATCH (u:GSuiteUser)-[r:INSTALLS]->(ext:ChromeExtension)
WHERE ext.name CONTAINS 'TotallyFake'
return ext.name, ext.version, u.email
What users have installed extensions that are risky based on CRXcavator scoring?
Risk > 200 is evidence of 3 or more critical risks or many high risks in the extension.
MATCH (u:GSuiteUser)-[r:INSTALLS]->(ext:ChromeExtension)
WHERE ext.risk_total > 200
return ext.name, ext.version, u.email