Hacking AWS
Amazon Web Services is a subsidiary of Amazon providing on-demand cloud computing platforms and APIs.
S3 Buckets
Amazon S3 has a simple web services interface that you can use to store and retrieve any amount of data, at any time, from anywhere on the web.
AWS Configuration
You can get your credential here https://console.aws.amazon.com/iam/home?#/security_credential but you need an aws account, free tier account : https://aws.amazon.com/s/dm/optimization/server-side-test/free-tier/free_np/
aws configure --profile <PROFILE_NAME>
AWSAccessKeyId= <AccessKeyID>
AWSSecretKey= <SecretKey>
Default Region Name= <Region>
Default Output Format = <json or text>Or you can configure by default:
aws configureSearch for S3 Buckets
We need to identify if the service running is a s3.
http://s3.amazonaws.com/[bucket_name]/
http://[bucket_name].s3.amazonaws.com/You can get the region of a bucket with a dig and nslookup:
Enumeration
We will use aws-cli tool
Use
--no-sign-requestfor check Everyones permissionsUse
--profile <PROFILE_NAME>to indicate the previous configuration profile.
Search Buckets inside the same host:
List content of a bucket:
Copy content:
DynamoDB
Amazon DynamoDB is a key-value and document database that delivers single-digit millisecond performance at any scale. It's a fully managed, multi-region, multi-active, durable database with built-in security, backup and restore, and in-memory caching for internet-scale applications.
List tables
Get Table Content
Create Table
Create Item
Last updated
Was this helpful?