General

Tools

# Non provider specific and general purpose
# https://github.com/nccgroup/ScoutSuite
# https://github.com/SygniaLabs/security-cloud-scout
# https://github.com/initstring/cloud_enum
python3 cloud_enum.py -k companynameorkeyword
# https://github.com/cyberark/SkyArk
# https://github.com/SecurityFTW/cs-suite
    cd /tmp
    mkdir .aws
    cat > .aws/config <<EOF
        [default]
        output = json
        region = us-east-1
    EOF
    cat > .aws/credentials <<EOF
        [default]
        aws_access_key_id = XXXXXXXXXXXXXXX
        aws_secret_access_key = XXXXXXXXXXXXXXXXXXXXXXXXX
    EOF
    docker run -v `pwd`/.aws:/root/.aws -v `pwd`/reports:/app/reports securityftw/cs-suite -env aws

# Dictionary
https://gist.github.com/BuffaloWill/fa96693af67e3a3dd3fb

Searching for bad configurations

No auditable items:
• DoS testing
• Intense fuzzing
• Phishing the cloud provider’s employees
• Testing other company’s assets
• Etc.

Audit policies

Comparison table

Recon

Cloud Labs

  • AWS Labs

    • flaws.cloud

    • flaws2.cloud

    • https://github.com/OWASP/Serverless-Goat

    • https://n0j.github.io/2017/10/02/aws-s3-ctf.html

    • https://github.com/RhinoSecurityLabs/cloudgoat

    • https://github.com/appsecco/attacking-cloudgoat2

    • https://github.com/m6a-UdS/dvca

    • https://github.com/OWASP/DVSA

    • https://github.com/nccgroup/sadcloud

    • https://github.com/torque59/AWS-Vulnerable-Lambda

    • https://github.com/wickett/lambhack

    • https://github.com/BishopFox/iam-vulnerable

  • GCP Labs

    • http://thunder-ctf.cloud/ https://gcpgoat.joshuajebaraj.com/

  • Azure Labs

    • https://github.com/azurecitadel/azure-security-lab

Last updated

Was this helpful?