diff --git a/AWS Amazon Bucket S3/README.md b/AWS Amazon Bucket S3/README.md index e9a574f54a..a39f06996b 100644 --- a/AWS Amazon Bucket S3/README.md +++ b/AWS Amazon Bucket S3/README.md @@ -5,6 +5,7 @@ - [Tools](#tools) - [AWS Configuration](#aws-configuration) - [Open Bucket](#open-bucket) +- [Open Bucket Takeover](#bucket-takeover) - [Basic tests](#basic-tests) - [Listing files](#listing-files) - [Move a file into the bucket](move-a-file-into-the-bucket) @@ -99,6 +100,20 @@ http://example.com/resources/id%C0 eg: http://redacted/avatar/123%C0 ``` +## Open Bucket Takeover + +AWS S3 Bucket Takeover using broken link in within email. + +Email of careems recives, which has a broken link, I did inspect element in browser to find the broken link, the link was: +Careem + +Broken link :https://s3.amazonaws.com/careemcrm/promotional/careem_logo_Care.png + +Then I just go to the bucket directly by:https://s3.amazonaws.com/careemcrm +Where It says, NoSuchBucket +Which means, I can register this bucket, so I did the same, Through the AWS CLI (from my account) I registered the Bucket and uploaded a file to it. Which can be now seemed in Careems email that we got. + + ## Basic tests ### Listing files @@ -222,4 +237,4 @@ pip install -r requirements.txt * [Guardzilla video camera hardcoded AWS credential - 0dayallday.org](https://www.0dayallday.org/guardzilla-video-camera-hard-coded-aws-credentials/) * [AWS PENETRATION TESTING PART 1. S3 BUCKETS - VirtueSecurity](https://www.virtuesecurity.com/aws-penetration-testing-part-1-s3-buckets/) * [AWS PENETRATION TESTING PART 2. S3, IAM, EC2 - VirtueSecurity](https://www.virtuesecurity.com/aws-penetration-testing-part-2-s3-iam-ec2/) -* [A Technical Analysis of the Capital One Hack - CloudSploit - Aug 2 2019](https://blog.cloudsploit.com/a-technical-analysis-of-the-capital-one-hack-a9b43d7c8aea?gi=8bb65b77c2cf) \ No newline at end of file +* [A Technical Analysis of the Capital One Hack - CloudSploit - Aug 2 2019](https://blog.cloudsploit.com/a-technical-analysis-of-the-capital-one-hack-a9b43d7c8aea?gi=8bb65b77c2cf)