Exploiting Weak S3 Bucket Policies
A walkthrough demonstrating how weak S3 Bucket policies can lead to system compromise, data exposure and exfiltration.
Overview
Pre-Requisites
Walkthrough
Nmap Enumeration
Gobuster Enumeration
Website Enumeration


S3 Bucket Enumeration


Cracking the Password with Hashcat




Gaining Access to the Website



Exfiltrating Data and Finding the Flag!


Wrap Up
Last updated