🔥 40% Off Crucial Exams Memberships — Deal ends today!

1 hour, 53 minutes remaining!

Certified Ethical Hacker (CEH) Practice Question

During a black-box assessment of a containerized web application running on an unmanaged EC2 instance, you discover that a reflected XSS can be repurposed into a server-side request forgery. Which cloud-specific threat would exploiting this SSRF most likely enable if the instance is still using the default IMDSv1 service?

  • Download the launch-time user-data script to recover embedded SSH private keys.

  • Retrieve the instance's temporary IAM role keys from the metadata service and reuse them to access other AWS resources.

  • Enumerate access-control lists of all S3 buckets by calling unauthenticated public endpoints.

  • Force the container runtime to pull and deploy a malicious image from a private Elastic Container Registry.

Certified Ethical Hacker (CEH)
Cloud Computing
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot