Discover AWS Public Resources
Public resources like EBS and RDS snapshots or SSM Documents can lead to data and credential leaks.
Dangers of Public Resources
Many AWS resources can become public whether intentionally or not and these resources may contain sensitive data and/or credentials that may lead to a compromised environment
There are legitimate use cases for exposing resources publicly (such as providing customers with easy access) but due diligence should be performed to ensure sensitive data and credentials are not contained in these resources
S3 Buckets
Since all S3 buckets have a unique URL, they can automatically be discovered
cloudenumworks by brute-forcing bucket names and informing if the bucket is real or not based on HTTP status codes. If a bucket is discovered, it attempts to list its contents
s3:ListBucket
EBS Snapshots
EBS Snapshots are backups of EC2 instances
dsnapis a useful tool for downloading snapshots for local inspection otherwise you can create an EC2 in your AWS account with the snapshot
RDS Snapshots
RDS Snapshots are backups of RDS Databases
SSM Documents
SSM Documents allow for running commands and automation
These may contain sensitive information
Last updated