Tools for finding public buckets
Introduction
Due to the common mistakes that administrators and AWS users do, a lot of buckets get exposed to the Internet. In recent years, a lot of data has been revealed through open S3 buckets ranging from employee contracts, software code base, sensitive information like network diagram to usernames and passwords etc.
There are several tools to find and dump the contents of public buckets.
What are we going to cover?
This chapter covers some popular tools that can be used find public buckets and dump data from within if required.
AWS Buckets
The following is a list of valid S3 bucketnames on EC2
Google dorking
Google is an extremely powerful search engine that can be used to find specific resources on the Internet
For example, the following dork can be used to find S3 buckets containing excel sheets which in turn contain potential passwords
Other keywords can also be used to find other information
Practice Exercise: DigiNinja Bucket Finder
Bucket finder is a ruby script that was written to work with discovering buckets with a provided dictionary.
If you want to download the contents of the discovered buckets then specify -d to enable file downloads
Additional references
Last updated