When performing a recon on a domain - understanding assets they own is very important. AWS S3 bucket permissions have been confused time and time again, and have allowed for the exposure of sensitive material.
What this tool does, is enumerate S3 bucket names using common patterns I have identified during my time bug hunting and pentesting. Permutations are supported on a root domain name using a custom wordlist. I highly recommend the one packaged within AltDNS.
The following information about every bucket found to exist will be returned:
- List Permission
- Write Permission
- Region the Bucket exists in
- If the bucket has all access disabled
Installation
go get -u github.com/glen-mac/goGetBucket
Usage
goGetBucket -m ~/tools/altdns/words.txt -d <domain> -o <output> -i <wordlist>
Usage of ./goGetBucket:
-d string
Supplied domain name (used with mutation flag)
-f string
Path to a testfile (default "/tmp/test.file")
-i string
Path to input wordlist to enumerate
-k string
Keyword list (used with mutation flag)
-m string
Path to mutation wordlist (requires domain flag)
-o string
Path to output file to store log
-t int
Number of concurrent threads (default 100)
Throughout my use of the tool, I have produced the best results when I feed in a list (-i
) of subdomains for a root domain I am interested in. E.G:www.domain.com
mail.domain.com
dev.domain.com
The test file (-f
) is a file that the script will attempt to store in the bucket to test write permissions. So maybe store your contact information and a warning message if this is performed during a bounty?The keyword list (
-k
) is concatenated with the root domain name (-d
) and the domain without the TLD to permutate using the supplied permuation wordlist (-m
).Be sure not to increase the threads too high (
-t
) - as the AWS has API rate limiting that will kick in and start giving an undesired return code.- Kik Hack Tools
- What Is Hacking Tools
- Hacking App
- Hacker Search Tools
- Hacking Tools Windows
- Pentest Recon Tools
- Hacker Tools Mac
- Hacker Tools For Mac
- Hacker Techniques Tools And Incident Handling
- Hacker Tools For Ios
- Tools 4 Hack
- Github Hacking Tools
- Hacking Tools For Mac
- Hacker
- Computer Hacker
- Hackrf Tools
- Black Hat Hacker Tools
- Pentest Tools Apk
- Hack Tools For Mac
- Tools For Hacker
- Hacker Hardware Tools
- Hack Tool Apk
- Game Hacking
- Pentest Tools
- Pentest Tools For Android
- Hacker Search Tools
- Top Pentest Tools
- Pentest Automation Tools
- Free Pentest Tools For Windows
- Hack Rom Tools
- Hack App
- Pentest Tools For Android
- Hacking Tools Windows 10
- Hacker Tools For Pc
- What Are Hacking Tools
- Hacking Tools Name
- Hacker Tools 2019
- Hackers Toolbox
- Usb Pentest Tools
- Pentest Tools Download
- Hacker Tools Apk Download
- Pentest Tools Url Fuzzer
- New Hacker Tools
- Pentest Recon Tools
- Hacker Tools Software
- Pentest Tools Open Source
- Hacking Apps
- Install Pentest Tools Ubuntu
- Pentest Tools Windows
- Hacker Tools 2019
- Pentest Tools
- Pentest Reporting Tools
- New Hack Tools
- Hacker Tools
- Hacker Tools Mac
- Hacking Tools For Windows
- Pentest Tools Find Subdomains
- Pentest Tools For Ubuntu
- Nsa Hack Tools
- Hacking Tools Online
- Pentest Tools Alternative
- Pentest Tools List
- What Are Hacking Tools
- Hacker Hardware Tools
- Hacking Tools 2019
- Pentest Reporting Tools
- Hack Tools
- Hack Tools Download
- Pentest Tools List
- Hacking Tools
- Nsa Hack Tools Download
- Hacker Tool Kit
- Hacker Tools Linux
- Android Hack Tools Github
- Hack Website Online Tool
- Kik Hack Tools
- Pentest Box Tools Download
- Pentest Tools
- Pentest Tools Port Scanner
- Hacker Techniques Tools And Incident Handling
- Hacker Tools
- Pentest Tools For Windows
- Hack Tool Apk
- Pentest Tools Find Subdomains
- Pentest Tools For Mac
No hay comentarios:
Publicar un comentario