AWS
Recon
s3enum
lazys3
BucketLoot
Bucket inspector that can help users extract assets, flag secret exposures and even search for custom keywords as well as Regular Expressions from publicly-exposed storage buckets by scanning files that store data in plain-text.
Bruteforce S3 buckets
regions.txt
AWSBucketDump
CloudShovel
Enumeration without authentication
AWS CLI
Configure a named profile
Or
Or
Information about configured identity
Stored Credentials
Windows
Linux
Enumeration - Users
List the IAM groups that the specified IAM user belongs to :
List all manages policies that are attached to the specified IAM user :
Lists the names of the inline policies embedded in the specified IAM user :
Enumeration - Groups
IAM Groups
All users in a group
All managed policies that are attached to the specified IAM Group
Names of the inline policies embedded in the specified IAM Group
Enumeration - Roles
List of IAM Roles
All managed policies that are attached to the specified IAM role
Names of the inline policies embedded in the specified IAM role
Enumeration - Policies
List of all iam policies
Information about the specified managed policy
Information about the versions of the specified manages policy
Information about the specified version of the specified managed policy
One of the permissions is iam:CreatePolicyVersion
? Use this to create a new version of the attached policy with privileged access
Specified inline policy document that is embedded on the specified IAM user / group / role
Enumeration - Cloud Services (EC2, S3 etc.) in an Organization AWS Account
SSRF
SSRF / RCEPacu
Setting the initial user access key
Permission of current logged-in user
Enumerate ec2 instance and get the public ip addresses
Enumerate privilege escalation permission and exploit it
Subdomain Takeover
AWS Elastic Beanstalk
IAM Enumeration
Privilege escalation opportunities in IAM configurations
IAM Security Assessment
Metadata
Unauthorized Access to Metadata and User Data
S3 Misconfiguration - Permissions
S3Scanner
Checkov
Nuclei Templates
AWS Extender - Burp Extension
List Permissions
Read Permissions
Download Permissions
Write Permissions
Make sure to use a filename with a non-trivial name to prevent any disruption
Read Permissions on ACL
Write Permissions on ACL
You do not have to always necessarily change an ACL to test for write permissions if read permissions are enabled. You can simply check the "Grants" property in the response to a read operation and verify if any unauthorized users are allowed to perform the write operation!
S3 Versioning
S3 - Shadow Resources
Security Groups - Segmentation
AWS Attack Path Management Tool
Persistence - IAM Role Anywhere
An attacker with sufficient permissions could exploit IAM Roles Anywhere to gain persistent access to an AWS account
Resources
Last updated
Was this helpful?