Storage Enumeration & Exploitation
Once you know which buckets or volumes exist, try to retrieve or tamper with data. (See [[Discovery & Reconnaissance]])
S3 Buckets
Upload Objects (if the bucket is writable):
Bucket ACL or Policy Misconfiguration If it succeeds, the bucket is world-writeable.EBS Snapshot Exploitation
Identify accessible snapshots (See [[Discovery & Reconnaissance]])
Use dsnap
to download:
sudo IMAGE=<path/to/snapshot.img> make docker/run
# Example: sudo IMAGE=./snap-xxxxxx.img make docker/run
~/.aws/credentials
, config files, or environment files.