When performing a recon on a domain - understanding assets they own is very important. AWS S3 bucket permissions have been confused time and time again, and have allowed for the exposure of sensitive material.
What this tool does, is enumerate S3 bucket names using common patterns I have identified during my time bug hunting and pentesting. Permutations are supported on a root domain name using a custom wordlist. I highly recommend the one packaged within AltDNS.
The following information about every bucket found to exist will be returned:
- List Permission
- Write Permission
- Region the Bucket exists in
- If the bucket has all access disabled
Installation
go get -u github.com/glen-mac/goGetBucket
Usage
goGetBucket -m ~/tools/altdns/words.txt -d <domain> -o <output> -i <wordlist>
Usage of ./goGetBucket:
-d string
Supplied domain name (used with mutation flag)
-f string
Path to a testfile (default "/tmp/test.file")
-i string
Path to input wordlist to enumerate
-k string
Keyword list (used with mutation flag)
-m string
Path to mutation wordlist (requires domain flag)
-o string
Path to output file to store log
-t int
Number of concurrent threads (default 100)
Throughout my use of the tool, I have produced the best results when I feed in a list (-i
) of subdomains for a root domain I am interested in. E.G:www.domain.com
mail.domain.com
dev.domain.com
The test file (-f
) is a file that the script will attempt to store in the bucket to test write permissions. So maybe store your contact information and a warning message if this is performed during a bounty?The keyword list (
-k
) is concatenated with the root domain name (-d
) and the domain without the TLD to permutate using the supplied permuation wordlist (-m
).Be sure not to increase the threads too high (
-t
) - as the AWS has API rate limiting that will kick in and start giving an undesired return code.More info
- Hacker Tools For Windows
- Pentest Tools Website Vulnerability
- Nsa Hacker Tools
- Beginner Hacker Tools
- Hacking Tools And Software
- Hacking Tools Free Download
- Hack Tools For Mac
- Hack Tools Github
- What Are Hacking Tools
- Hacker Tools 2019
- Pentest Tools Github
- Hacking Tools For Windows 7
- Pentest Recon Tools
- Hacking Tools For Windows 7
- Pentest Tools Linux
- Hacker Tools For Ios
- Hacking App
- Pentest Recon Tools
- Hacking Tools Mac
- Github Hacking Tools
- Hacker Tools For Ios
- Blackhat Hacker Tools
- Pentest Tools For Ubuntu
- Pentest Tools Github
- Hacking Tools For Beginners
- Hacking Tools And Software
- Nsa Hacker Tools
- Pentest Tools Subdomain
- Hacker Tools Hardware
- Hack Tools 2019
- Pentest Tools For Mac
- Hacking Tools For Pc
- Pentest Tools Download
- Hacker Tools Software
- Ethical Hacker Tools
- Hack Tools For Games
- Hack Tools For Ubuntu
- Hacker Tools Hardware
- Hacker
- Pentest Recon Tools
- Nsa Hack Tools
- Hacking Tools Github
- Pentest Tools Nmap
- Hacking Tools Github
- Hack Tools 2019
- Hacker Search Tools
- Game Hacking
- Hacking Tools Github
- Hacker Hardware Tools
- Pentest Tools For Android
- Bluetooth Hacking Tools Kali
- Pentest Tools Linux
- Pentest Tools Subdomain
- Hacker Tools For Windows
- Hack Tools 2019
- Hack Tools For Pc
- Hack Website Online Tool
- Usb Pentest Tools
- Top Pentest Tools
- Usb Pentest Tools
- Pentest Tools Tcp Port Scanner
- Hacking Tools Windows 10
- Hacker
- Hacker Techniques Tools And Incident Handling
- Pentest Tools Url Fuzzer
- Hacker Tools Windows
- Hacker Search Tools
- Hacking Tools Windows
- Hacking App
- Free Pentest Tools For Windows
- Pentest Tools Bluekeep
- Pentest Tools Website Vulnerability
- Wifi Hacker Tools For Windows
No comments:
Post a Comment