A New Internet Library: Add Your Website/Blog or Suggest A Website/Blog to our Free Web Directory http://anil.myfunda.net.

Its very simple, free and SEO Friendly.
Submit Now....

Thursday, June 11, 2020

goGetBucket - A Penetration Testing Tool To Enumerate And Analyse Amazon S3 Buckets Owned By A Domain


When performing a recon on a domain - understanding assets they own is very important. AWS S3 bucket permissions have been confused time and time again, and have allowed for the exposure of sensitive material.

What this tool does, is enumerate S3 bucket names using common patterns I have identified during my time bug hunting and pentesting. Permutations are supported on a root domain name using a custom wordlist. I highly recommend the one packaged within AltDNS.

The following information about every bucket found to exist will be returned:
  • List Permission
  • Write Permission
  • Region the Bucket exists in
  • If the bucket has all access disabled

Installation
go get -u github.com/glen-mac/goGetBucket

Usage
goGetBucket -m ~/tools/altdns/words.txt -d <domain> -o <output> -i <wordlist>
Usage of ./goGetBucket:
-d string
Supplied domain name (used with mutation flag)
-f string
Path to a testfile (default "/tmp/test.file")
-i string
Path to input wordlist to enumerate
-k string
Keyword list (used with mutation flag)
-m string
Path to mutation wordlist (requires domain flag)
-o string
Path to output file to store log
-t int
Number of concurrent threads (default 100)
Throughout my use of the tool, I have produced the best results when I feed in a list (-i) of subdomains for a root domain I am interested in. E.G:
www.domain.com
mail.domain.com
dev.domain.com
The test file (-f) is a file that the script will attempt to store in the bucket to test write permissions. So maybe store your contact information and a warning message if this is performed during a bounty?
The keyword list (-k) is concatenated with the root domain name (-d) and the domain without the TLD to permutate using the supplied permuation wordlist (-m).
Be sure not to increase the threads too high (-t) - as the AWS has API rate limiting that will kick in and start giving an undesired return code.

Related articles

  1. Hacking Resources
  2. Hacking Link
  3. Hacking Lab
  4. Hacking Websites
  5. Hacking Jacket
  6. Pentest Questions
  7. Hacking With Raspberry Pi
  8. Hacking Programs
  9. Pentest Basics
  10. Hacking Simulator
  11. Hacking To The Gate
  12. Hacking Device
  13. Hacking Ethics
  14. Hacking Online Games
  15. Pentest Network
  16. Pentest With Metasploit
  17. Pentest Usb

How To Install And Config Modlishka Tool - Most Advance Reverse Proxy Phishing

Read more

  1. Pentest Cheat Sheet
  2. Pentester Academy
  3. Hacking Growth
  4. Pentestgeek
  5. Pentest Online Course
  6. Hacking Hardware
  7. Pentest Magazine
  8. Pentesterlab
  9. Pentest Certification
  10. Pentest Questions
  11. Pentest Wordpress

Dotnet-Interviews