mirror of
https://github.com/mgeeky/Penetration-Testing-Tools.git
synced 2024-11-25 03:51:37 +01:00
README
This commit is contained in:
parent
3257f13c0f
commit
168572e3be
@ -92,3 +92,5 @@ Afterwards, one should see following logs in CloudWatch traces for planted Lambd
|
|||||||
```
|
```
|
||||||
[*] Following S3 object could be removed: (Bucket=90112981864022885796153088027941100000000000000000000000, Key=cloudtrail/AWSLogs/712800000000/CloudTrail/us-west-2/2019/03/20/712800000000_CloudTrail_us-west-2_20190320T1000Z_oxxxxxxxxxxxxc.json.gz)
|
[*] Following S3 object could be removed: (Bucket=90112981864022885796153088027941100000000000000000000000, Key=cloudtrail/AWSLogs/712800000000/CloudTrail/us-west-2/2019/03/20/712800000000_CloudTrail_us-west-2_20190320T1000Z_oxxxxxxxxxxxxc.json.gz)
|
||||||
```
|
```
|
||||||
|
|
||||||
|
- **`identifyS3Bucket.rb`** - This script attempts to identify passed name whether it resolves to a valid AWS S3 Bucket via different means. This script may come handy when revealing S3 buckets hidden behind HTTP proxies.
|
||||||
|
@ -144,6 +144,7 @@ def checkBucketResponse(bucket)
|
|||||||
'<Error><Code>AllAccessDisabled</Code>',
|
'<Error><Code>AllAccessDisabled</Code>',
|
||||||
'<Error><Code>PermanentRedirect</Code><Message>',
|
'<Error><Code>PermanentRedirect</Code><Message>',
|
||||||
'</Endpoint><Bucket>',
|
'</Endpoint><Bucket>',
|
||||||
|
'<Error><Code>TemporaryRedirect</Code>',
|
||||||
"<Name>#{bucket}</Name>",
|
"<Name>#{bucket}</Name>",
|
||||||
"<Bucket>#{bucket}</Bucket>"
|
"<Bucket>#{bucket}</Bucket>"
|
||||||
]
|
]
|
||||||
|
Loading…
Reference in New Issue
Block a user