Hacking AWS
Amazon Web Services is a subsidiary of Amazon providing on-demand cloud computing platforms and APIs.
S3 Buckets
Amazon S3 has a simple web services interface that you can use to store and retrieve any amount of data, at any time, from anywhere on the web.
AWS Configuration
You can get your credential here https://console.aws.amazon.com/iam/home?#/security_credential but you need an aws account, free tier account : https://aws.amazon.com/s/dm/optimization/server-side-test/free-tier/free_np/
Or you can configure by default:
Search for S3 Buckets
We need to identify if the service running is a s3.
You can get the region of a bucket with a dig and nslookup:
Enumeration
We will use aws-cli
tool
Use
--no-sign-request
for check Everyones permissionsUse
--profile <PROFILE_NAME>
to indicate the previous configuration profile.
Search Buckets inside the same host:
List content of a bucket:
Copy content:
DynamoDB
Amazon DynamoDB is a key-value and document database that delivers single-digit millisecond performance at any scale. It's a fully managed, multi-region, multi-active, durable database with built-in security, backup and restore, and in-memory caching for internet-scale applications.
List tables
Get Table Content
Create Table
Create Item
Last updated
Was this helpful?