OSINT against cloud targets

Cloud Open Source Intelligence Gathering

Introduction

This section covers the different OSINT techniques that can be employed to find information about particular AWS services and the tools that can use the information obtained to chain other attacks.

What are we going to cover

This chapter will primarily cover

  • Tools and techniques for Open Source Intelligence Gathering to find information

  • Tools for discovering and stealing keys, information and endpoints

  • Tools for finding public buckets

Last updated