githubEdit

S3

Enumerate misconfigured CloudFront Origins for Public S3 Buckets

1) DNS Enumeration

nslookup

nslookup domain.org
nslookup IP_ADDRESS
nslookup subdomain.domain.org
nslookup assets.domain.org.s3.amazonaws.com

2) Subdomain enumeration

Google search

org: domain.org site: s3.amazonaws.com

3) Web Page Source Inspection

Right-Click -> View Page Source
CTRL+F -> s3.amazonaws.com

Exploit S3 Buckets

1) Unauthenticated S3 Bucket dumping

2) Bucket enumeration

3) Download a file from a bucket

4) Enumerate bucket policies

Exploit Services that are paired/used with S3

EC2

1) Generate AMI from image

Authenticate with AWS credentials first

2) Create your SSH key pair

3) Describe Subnets

Use any subnet with Tag value "SubnetA"

4) Describe available security groups

Find a security group that allows SSH Access

5) Create EC2 instance from AMI

6) SSH to instance

Find the piblic IP in the AWS Console:

EC2 -> Instances -> INSTANCE_ID

Last updated