Cloud
recon
Cloud DNS Enumeration
python cloudflair.py -d example.comCloud Service Enumeration
cloudmapper collect --account example_accountCloud Storage Bucket Enumeration
python GCPBucketBrute.py -d example.com -p projects.txt -nCloud Application Enumeration
nmap -p 80,443,8080 example.comCloud Metadata Enumeration
python inspy.py -d example.comCloud Provider Enumration
python3 cloudenum.py -u example.comScan a Single Domain(Search for potential frontable domains)
python3 findfrontabledomains.py -d example.comScan a List of Domains from a File(Search for potential frontable domains)
python3 findfrontabledomains.py -f domains.txtDomain Fronting
python cdn-search.py -d DOMAIN
python validate-domains.pyScrape a Single Website
python3 cloudscraper.py --url https://www.example.comScrape a Website with Proxy Support:
python3 cloudscraper.py --url https://www.example.com --proxy http://proxy.example.com:8080Enumerate Cloud Providers for a Specific Domain
python cloud_enum.py --domain example.comEnumerate Cloud Providers from a List of Domains in a File
python cloud_enum.py --file domains.txtIdentify privilege escalation paths and dangerous permissions in the cloud/saas configurations
python3 main.py -e -p google,github,k8s --github-only-org --k8s-get-secret-values --gcp-get-secret-values # Enumerate google, github and k8sBloodHound in Cloud
install.bat C:\project\BloodHoundGraphing Azure Active Directory objects
python3 ./sscollector.pyTo run DigitalOcean Audit
python cs.py -env digitaloceanAttempts to find public S3 buckets from permutations of the certificates domain name
https://github.com/eth0izzle/bucket-stream python bucket-stream.py
or
https://github.com/nahamsec/lazys3
ruby lazys3.rb <COMPANY> Scan and Generate Graph Database(Consolidates infrastructure assets and the relationships):
cartography --connect aws --inventory-only --neo4j-uri bolt://localhost:7687 --neo4j-username <USERNAME> --neo4j-password <PASSWORD>Export Data to JSON Format(Consolidates infrastructure assets and the relationships):
cartography --export-file cartography.jsonRun a Custom Plugin(Consolidates infrastructure assets and the relationships):
cartography --connect aws --custom-plugin my_custom_plugin.pyDiscovering open S3 Buckets
festin mydomain.comAWS
Enumerate EC2 Instances:
python3 weirdAAL.py -m enumeration.enum_ec2or PACU
run enumeration/ec2_instancesEnumerate S3 Buckets:
python3 weirdAAL.py -m enumeration.enum_s3or PACU
run enumeration/s3_bucketsEnumerate IAM Users:
python3 weirdAAL.py -m enumeration.enum_iam_usersor PACU
run enumeration/iam_usersEnumerate RDS Instances:
python3 weirdAAL.py -m enumeration.enum_rdsor PACU
run enumeration/rds_instancesScan for Open Elasticsearch Instances:
python3 weirdAAL.py -m enumeration.enum_elasticsearchor PACU
run enumeration/elasticsearch_instancesChecks the permissions of the bucket
php s3-buckets-bruteforcer.php --bucket gwen001-test002List all instances in a region:
aws ec2 describe-instancesCreate a new EC2 instance:
aws ec2 run-instances --image-id ami-0c55b159cbfafe1f0 --count 1 --instance-type t2.micro --key-name my-key-pair --security-group-ids sg-903004f8 --subnet-id subnet-6e7f829e --associate-public-ip-addressCreate a new S3 bucket:
aws s3 mb s3://my-bucket-nameTo run AWS Audit
python cs.py -env awsGoogle Cloud SDK
List all instances in a project:
gcloud compute instances listCreate a new VM instance:
gcloud compute instances create example-instance --machine-type=n1-standard-1 --image-project=debian-cloud --image-family=debian-10 --zone us-central1-aCreate a new Cloud Storage bucket:
gsutil mb -p my-project-id gs://my-bucket-nameScan for buckets using the keyword “test” while completely unauthenticated
python3 gcpbucketbrute.py -k test -uTo run GCP Audit
python cs.py -env gcp -pId <project_name>Microsoft Azure CLI
List all virtual machines in a resource group:
az vm list -g my-resource-groupCreate a new virtual machine:
az vm create --resource-group my-resource-group --name my-vm --image UbuntuLTS --admin-username azureuser --generate-ssh-keysCreate a new storage account:
az storage account create --name mystorageaccount --resource-group myresourcegroup --location eastus --sku Standard_LRSAzureStealth Scan
(1) Import-Module .\SkyArk.ps1 -force
(2) Start-AzureStealthAWStealth Scan
(1) Import-Module .\SkyArk.ps1 -force
(2) Start-AWStealthTo run Azure Audit
python cs.py -env azureS3 bucket misconfigurations
Check if a bucket is publicly accessible:
aws s3api get-bucket-acl --bucket [bucket-name]Check if bucket logging is enabled:
aws s3api get-bucket-logging --bucket [bucket-name]Check if server-side encryption is enabled
aws s3api get-bucket-encryption --bucket [bucket-name]IAM misconfigurations
Check for unused IAM users and roles:
aws iam list-users and aws iam list-rolesCheck for unused IAM access keys:
aws iam list-access-keys --user-name [user-name]Check for unused IAM permissions:
aws iam get-policy --policy-arn [policy-arn]Security Group misconfigurations
Check for open ports in a security group:
aws ec2 describe-security-groups --group-id [security-group-id]Check for unrestricted outbound traffic:
aws ec2 describe-security-groups --filters Name=ip-permission.protocol,Values=all Name=ip-permission.cidr,Values=0.0.0.0/0Check for unrestricted inbound traffic from specific IP ranges:
aws ec2 describe-security-groups --filters Name=ip-permission.protocol,Values=tcp Name=ip-permission.cidr,Values=[ip-range]/32VPC misconfigurations
Check for unused VPCs:
aws ec2 describe-vpcsCheck for unrestricted peering:
aws ec2 describe-vpc-peering-connections --filters Name=status-code,Values=active Name=requester-vpc-info.vpc-id,Values=[vpc-id]
Last updated