Enumerate AWS Public Resources
Public resources like EBS and RDS snapshots or SSM Documents can lead to data and credential leaks.
Dangers of Public Resources
S3 Buckets
# python3 ./cloud_enum.py -k tylerexposedbucket234 --disable-gcp --disable-azure
[+] Checking for S3 buckets
OPEN S3 BUCKET: http://tylerexposedbucket234.s3.amazonaws.com/
FILES:
->http://tylerexposedbucket234.s3.amazonaws.com/tylerexposedbucket234
->http://tylerexposedbucket234.s3.amazonaws.com/dogs.txt
->http://tylerexposedbucket234.s3.amazonaws.com/secrets.txt
Protected S3 Bucket: http://tyler.s3.amazonaws.com/
Protected S3 Bucket: http://tyler1.s3.amazonaws.com/
Protected S3 Bucket: http://tyler-1.s3.amazonaws.com/
Protected S3 Bucket: http://tyler2.s3.amazonaws.com/EBS Snapshots
RDS Snapshots
SSM Documents
Last updated