mirror of
https://github.com/mgeeky/Penetration-Testing-Tools.git
synced 2024-11-24 19:41:36 +01:00
README
This commit is contained in:
parent
3257f13c0f
commit
168572e3be
@ -92,3 +92,5 @@ Afterwards, one should see following logs in CloudWatch traces for planted Lambd
|
||||
```
|
||||
[*] Following S3 object could be removed: (Bucket=90112981864022885796153088027941100000000000000000000000, Key=cloudtrail/AWSLogs/712800000000/CloudTrail/us-west-2/2019/03/20/712800000000_CloudTrail_us-west-2_20190320T1000Z_oxxxxxxxxxxxxc.json.gz)
|
||||
```
|
||||
|
||||
- **`identifyS3Bucket.rb`** - This script attempts to identify passed name whether it resolves to a valid AWS S3 Bucket via different means. This script may come handy when revealing S3 buckets hidden behind HTTP proxies.
|
||||
|
@ -144,6 +144,7 @@ def checkBucketResponse(bucket)
|
||||
'<Error><Code>AllAccessDisabled</Code>',
|
||||
'<Error><Code>PermanentRedirect</Code><Message>',
|
||||
'</Endpoint><Bucket>',
|
||||
'<Error><Code>TemporaryRedirect</Code>',
|
||||
"<Name>#{bucket}</Name>",
|
||||
"<Bucket>#{bucket}</Bucket>"
|
||||
]
|
||||
|
Loading…
Reference in New Issue
Block a user