Link to this headingS3
Link to this headingViewable Buckets
List of S3 Buckets:
https://github.com/hehnope/slurp
https://github.com/sa7mon/S3Scanner
Info https://blog.intigriti.com/hacking-tools/hacking-misconfigured-aws-s3-buckets-a-complete-guide
Link to this headingGlobal Viewable (Anonymous)
Check if buckets can be viewable:
AWS
Do not use the Everyone option for Grantee
List files:
Download single file:
Sync whole bucket (download):
Upload file:
Link to this headingViewable by other S3 Users
Sometimes s3 buckets have been mistakenly configured to enable any user from any AWS account to authenticate
to resources within the s3 bucket. In this manner resources seem secure as the anonymous attempts will fail but if an attacker has an AWS account of there own, they may be able to leverage their own account to access the resources within another account.
Check if buckets can be viewable by other s3 users:
Do not use the Any Authenticated AWS User option for Grantee
Get AWS region for bucket:
List object in bucket:
Link to this headingClone the S3 info
Clone S3 bucket to file system: