Aws Recon Webinar Material
Aws Recon Webinar Material
Is a cloud security enthusiast with a keen interest in the intricacies of cloud services offered by AWS,
Azure, and GCP. Possessing a comprehensive understanding of these platforms, they are particularly
drawn to exploring Red Team methodologies. Interested in Red Team methodologies, focusing on
vulnerability testing and detection across external attack surfaces.
Table of Contents
❖ AWS Services ❖ Sample Public URLs
➢ Elastic Cloud Compute (EC2)
➢ Simple Storage Service (S3) ❖ Recon:
➢ Elastic Block Store (EBS) ➢ Scenario 1: OSINT
➢ Relational Database Service (RDS) ➢ Scenario 2: Unauthenticated
➢ Elastic Load Balancing (ELB) Enumeration
➢ Cognito
➢ Cloudfront
➢ Lambda
AWS Services
EC2 | S3 | ELB | RDS | EBS
Lambda | CloudFront | Cognito
Elastic Compute Cloud (EC2)
➢ EC2 provides globally distributed virtual machines known as Instances.
➢ These Instances are divided into different categories which are targeted
towards specific workloads.
➢ In EC2, an Operating System (OS) is known as Amazon Machine Image
(AMI).
Simple Storage Service (S3)
➢ S3 provides scalable object storage service.
➢ S3 is divided into multiple storage classes tailored for particular use cases.
➢ The data objects are stored inside storage containers dubbed as buckets.
➢ These bucket names are globally unique across all S3 buckets in a given
partition (Standard Regions, China Regions, and AWS GovCloud-US).
Elastic Block Store (EBS)
➢ AWS EBS (Elastic Block Store) is a block storage service provided by
Amazon Web Services (AWS) for use with Amazon Elastic Compute
Cloud (EC2) instances.
➢ Key features of AWS EBS include:
○ Block Storage
○ Elasticity
○ Performance
○ Snapshots and Backups
○ Data Encryption
○ High Availability
○ Integration with AWS Services
Relational Database Service (RDS)
➢ AWS RDS (Relational Database Service) is a managed database service
provided by Amazon Web Services (AWS).
➢ RDS supports various database engines, including MySQL, PostgreSQL,
MariaDB, Oracle, SQL Server, and Amazon Aurora.
➢ Key features of AWS RDS include:
○ Automated Backups
○ Automated Scaling
○ High Availability
○ Security
○ Monitoring and Metrics
○ Database Engine Options
Elastic Load Balancing (ELB)
➢ ELB is load balancing service which scales resources and distributes traffic
among different targets (Instances, IPs, Containers) in one or more
Availability Zones.
➢ ELB provides following offerings for different use cases:-
○ Application Load Balancers: Operates on layer 7 with support for protocols like HTTP(s) &
WebSockets
○ Classic Load Balancer: Operates on layer 4/7 while supporting HTTP(s), TCP, & SSL/TLS
○ Gateway Load Balancers: Operates on layer 3 while supporting IP protocol
○ Network Load Balancers: Operates on layer 4 with support for TCP & UDP
Cognito
➢ Cognito is a Customer Identity and Access Management service.
➢ It provides scalable user identity management with integrations with AWS
services & custom solutions.
➢ Cognito is consist of two main components as follows:
○ User Pool: Directory of user information
○ Identity Pool: Access manager for different AWS resource access
CloudFront
➢ CloudFront is a globally distributed, fast & secure Content Delivery
Network (CDN).
➢ It is commonly used to serve content (static/dynamic) from a location near
to visitor.
➢ CloudFront provides seamless integration with AWS services & custom
applications.
➢ It can be used to hide origin information.
Lambda
➢ AWS Lambda is a serverless computing service provided by Amazon Web
Services (AWS). It allows you to run code without provisioning or managing
servers.
➢ With Lambda, you can execute code in response to events triggered by other
AWS services, HTTP requests via Amazon API Gateway, or custom events.
➢ Key aspects of AWS Lambda include:
○ Event-driven
○ Serverless
○ Supported Runtimes
○ Pay-per-use
○ Scalability
○ Integration
Public URLs
For Available Services
Services Sample Public URL
EC2 http://<ec2-public-ip>
S3 https://<s3-bucket-name>.s3.amazonaws.com/<object-key>
OR
http://[bucketname].s3-website-[region].amazonaws.com/
CloudFront https://<random_id>.cloudfront.net
SSO https://<CompanyName>.awsapps.com/
Scenario 1:
OSINT
RECON
EC2 Recon
Recon via Shodan:
org:Amazon ssl.cert.subject.cn:<ORGANIZATION_NAME>
net:<NETBLOCK_RANGE> ssl.cert.subject.cn:<ORGANIZATION_NAME>
org:Amazon hostname:<ORGANIZATION_NAME>
EC2 Recon
Recon via fofa:
title:"AWS S3 Explorer"
app="amazon-AmazonS3"
body="ListBucketResult"
S3 Recon
CLI-based Recon:
● Cloud Enum:
● S3 Scanner:
● BucketLoot:
./bucketloot <Target_URL>
S3 Recon
Web-based Recon:
● Bucket search:
○ https://osint.sh/buckets
○ https://buckets.grayhatwarfare.com
○ https://builtwith.com/
○ https://s3browser.com/
○
● Dorks:
○ GitHub Dorks:
“s3.amazonaws.com” org:<ORGANIZATION_NAME>
S3 Recon
Web-based Recon:
● Dorks:
○ More Google Dorks:
site:.s3.amazonaws.com "Company"
site:http://s3.amazonaws.com intitle:index.of.bucket “”
Web-based Recon:
● Dork:
CLI-based Recon:
● Cloud Enum:
Set-Cookie: AWSELB
Location: elb.amazonaws.com
dns.names: "elb.amazonaws.com"
ELB Recon
Recon via fofa:
Location: aws.cognito.signin.user.admin
amazoncognito.com
"aws.cognito.signin.user.admin"
Cognito Recon
Recon via fofa:
Web-based Recon:
● Dorks:
○ Github Dorks:
filename:serverless.yml "aws_lambda_function"
filename:credentials "aws_access_key_id"
"aws_secret_access_key"
filename:serverless.yml "iamRoleStatements"
Lambda Recon
Web-based Recon:
● Dorks:
○ Google Dorks:
site:aws.amazon.com “<KEYWORD>”
site:github.com "arn:aws:lambda"
Scenario 2:
Unauthenticated
Enumeration
Enum
EC2 Image Recon
CLI-based Recon:
➢ To identify publicly accessible Amazon Machine Image (AMI), Search AMI by
ownerID, Search AMI by substr ("shared" in the example).
★ OUTPUT
S3 Recon
CLI-based Recon:
➢ To describe the Access Control List (ACL) configuration set for the Everyone (public
access) grantee, available for the selected S3 bucket
★ OUTPUT
EBS Snapshot Recon
CLI-based Recon:
➢ To identify any publicly accessible EBS volume snapshots within your AWS account.
★ OUTPUT
EBS Snapshot Recon
CLI-based Recon:
➢ To identify any publicly accessible EBS volume snapshots within your AWS account.
For Professional Red Team / Blue Team / Purple Team / Cloud Cyber Range labs / Trainings
please contact
[email protected]
To know more about our offerings, please visit: https://cyberwarfare.live