☁️ Cloud Computing
Cloud computing is the delivery of computing services over the internet, allowing users to access and use resources such as servers, storage, databases, networking, software, and analytics without the need for on-premises infrastructure.
Because cloud computing services are still based on physical hardware, they are vulnerable to the same types of attacks as traditional computing environments. This includes attacks on the underlying infrastructure, such as servers and storage devices, as well as attacks on the applications and data stored in the cloud.
S3 Bucket Enumeration
Section titled “S3 Bucket Enumeration”S3 buckets are a popular storage solution provided by Amazon Web Services (AWS).
They are often used to store and share data, making them a common target for attackers.
S3 bucket enumeration is the process of discovering and accessing S3 buckets that may contain sensitive data or misconfigured permissions.
AWS CLI
Section titled “AWS CLI”The AWS Command Line Interface (CLI) is a powerful tool for managing AWS services from the command line.
It allows users to automate tasks, manage resources, and perform various operations on AWS services.
# Configure a new AWS CLI profileaws configure --profile PROFILE_NAME
# List all S3 bucketsaws s3 ls
# List all objects in a specific S3 bucketaws s3 ls s3://BUCKET_NAME
# Download a file from an S3 bucketaws s3 cp s3://BUCKET_NAME/FILE_NAME .
# Get secret keys from AWS CLIaws configure list
# Get available secretsaws secretsmanager list-secrets
# Get secret valueaws secretsmanager get-secret-value --secret-id SECRET_ID
# Get IAM user informationaws iam list-usersaws iam get-useraws iam list-access-keysaws iam get-access-key-last-used --access-key-id ACCESS_KEY_IDaws iam list-groups