diff --git a/AWS Amazon Bucket S3/README.md b/AWS Amazon Bucket S3/README.md
index e9a574f54a..a39f06996b 100644
--- a/AWS Amazon Bucket S3/README.md
+++ b/AWS Amazon Bucket S3/README.md
@@ -5,6 +5,7 @@
- [Tools](#tools)
- [AWS Configuration](#aws-configuration)
- [Open Bucket](#open-bucket)
+- [Open Bucket Takeover](#bucket-takeover)
- [Basic tests](#basic-tests)
- [Listing files](#listing-files)
- [Move a file into the bucket](move-a-file-into-the-bucket)
@@ -99,6 +100,20 @@ http://example.com/resources/id%C0
eg: http://redacted/avatar/123%C0
```
+## Open Bucket Takeover
+
+AWS S3 Bucket Takeover using broken link in within email.
+
+Email of careems recives, which has a broken link, I did inspect element in browser to find the broken link, the link was:
+
+
+Broken link :https://s3.amazonaws.com/careemcrm/promotional/careem_logo_Care.png
+
+Then I just go to the bucket directly by:https://s3.amazonaws.com/careemcrm
+Where It says, NoSuchBucket
+Which means, I can register this bucket, so I did the same, Through the AWS CLI (from my account) I registered the Bucket and uploaded a file to it. Which can be now seemed in Careems email that we got.
+
+
## Basic tests
### Listing files
@@ -222,4 +237,4 @@ pip install -r requirements.txt
* [Guardzilla video camera hardcoded AWS credential - 0dayallday.org](https://www.0dayallday.org/guardzilla-video-camera-hard-coded-aws-credentials/)
* [AWS PENETRATION TESTING PART 1. S3 BUCKETS - VirtueSecurity](https://www.virtuesecurity.com/aws-penetration-testing-part-1-s3-buckets/)
* [AWS PENETRATION TESTING PART 2. S3, IAM, EC2 - VirtueSecurity](https://www.virtuesecurity.com/aws-penetration-testing-part-2-s3-iam-ec2/)
-* [A Technical Analysis of the Capital One Hack - CloudSploit - Aug 2 2019](https://blog.cloudsploit.com/a-technical-analysis-of-the-capital-one-hack-a9b43d7c8aea?gi=8bb65b77c2cf)
\ No newline at end of file
+* [A Technical Analysis of the Capital One Hack - CloudSploit - Aug 2 2019](https://blog.cloudsploit.com/a-technical-analysis-of-the-capital-one-hack-a9b43d7c8aea?gi=8bb65b77c2cf)