mirror of
https://github.com/HackTricks-wiki/hacktricks-cloud.git
synced 2026-01-16 06:42:39 -08:00
Translated ['src/README.md', 'src/banners/hacktricks-training.md', 'src/
This commit is contained in:
@@ -1,58 +1,54 @@
|
||||
# AWS - Unauthenticated Enum & Access
|
||||
# AWS - 認証なしの列挙とアクセス
|
||||
|
||||
{{#include ../../../banners/hacktricks-training.md}}
|
||||
|
||||
## AWS Credentials Leaks
|
||||
## AWS 認証情報の漏洩
|
||||
|
||||
A common way to obtain access or information about an AWS account is by **searching for leaks**. You can search for leaks using **google dorks**, checking the **public repos** of the **organization** and the **workers** of the organization in **Github** or other platforms, searching in **credentials leaks databases**... or in any other part you think you might find any information about the company and its cloud infa.\
|
||||
Some useful **tools**:
|
||||
AWS アカウントへのアクセスや情報を取得する一般的な方法は、**漏洩を検索すること**です。**google dorks**を使用して漏洩を検索したり、**組織**や**組織の従業員**の**Github**や他のプラットフォームの**公開リポジトリ**をチェックしたり、**認証情報漏洩データベース**を検索したり、会社やそのクラウドインフラに関する情報を見つける可能性のある他の場所を探したりできます。\
|
||||
いくつかの便利な**ツール**:
|
||||
|
||||
- [https://github.com/carlospolop/leakos](https://github.com/carlospolop/leakos)
|
||||
- [https://github.com/carlospolop/pastos](https://github.com/carlospolop/pastos)
|
||||
- [https://github.com/carlospolop/gorks](https://github.com/carlospolop/gorks)
|
||||
|
||||
## AWS Unauthenticated Enum & Access
|
||||
## AWS 認証なしの列挙とアクセス
|
||||
|
||||
There are several services in AWS that could be configured giving some kind of access to all Internet or to more people than expected. Check here how:
|
||||
AWS には、インターネット全体または予想以上の多くの人々にアクセスを提供するように構成できるサービスがいくつかあります。ここで確認してください:
|
||||
|
||||
- [**Accounts Unauthenticated Enum**](aws-accounts-unauthenticated-enum.md)
|
||||
- [**Cloud9 Unauthenticated Enum**](https://github.com/carlospolop/hacktricks-cloud/blob/master/pentesting-cloud/aws-security/aws-unauthenticated-enum-access/broken-reference/README.md)
|
||||
- [**Cloudfront Unauthenticated Enum**](aws-cloudfront-unauthenticated-enum.md)
|
||||
- [**Cloudsearch Unauthenticated Enum**](https://github.com/carlospolop/hacktricks-cloud/blob/master/pentesting-cloud/aws-security/aws-unauthenticated-enum-access/broken-reference/README.md)
|
||||
- [**Cognito Unauthenticated Enum**](aws-cognito-unauthenticated-enum.md)
|
||||
- [**DocumentDB Unauthenticated Enum**](aws-documentdb-enum.md)
|
||||
- [**EC2 Unauthenticated Enum**](aws-ec2-unauthenticated-enum.md)
|
||||
- [**Elasticsearch Unauthenticated Enum**](aws-elasticsearch-unauthenticated-enum.md)
|
||||
- [**IAM Unauthenticated Enum**](aws-iam-and-sts-unauthenticated-enum.md)
|
||||
- [**IoT Unauthenticated Access**](aws-iot-unauthenticated-enum.md)
|
||||
- [**Kinesis Video Unauthenticated Access**](aws-kinesis-video-unauthenticated-enum.md)
|
||||
- [**Media Unauthenticated Access**](aws-media-unauthenticated-enum.md)
|
||||
- [**MQ Unauthenticated Access**](aws-mq-unauthenticated-enum.md)
|
||||
- [**MSK Unauthenticated Access**](aws-msk-unauthenticated-enum.md)
|
||||
- [**RDS Unauthenticated Access**](aws-rds-unauthenticated-enum.md)
|
||||
- [**Redshift Unauthenticated Access**](aws-redshift-unauthenticated-enum.md)
|
||||
- [**SQS Unauthenticated Access**](aws-sqs-unauthenticated-enum.md)
|
||||
- [**S3 Unauthenticated Access**](aws-s3-unauthenticated-enum.md)
|
||||
- [**アカウントの認証なし列挙**](aws-accounts-unauthenticated-enum.md)
|
||||
- [**Cloud9 認証なし列挙**](https://github.com/carlospolop/hacktricks-cloud/blob/master/pentesting-cloud/aws-security/aws-unauthenticated-enum-access/broken-reference/README.md)
|
||||
- [**Cloudfront 認証なし列挙**](aws-cloudfront-unauthenticated-enum.md)
|
||||
- [**Cloudsearch 認証なし列挙**](https://github.com/carlospolop/hacktricks-cloud/blob/master/pentesting-cloud/aws-security/aws-unauthenticated-enum-access/broken-reference/README.md)
|
||||
- [**Cognito 認証なし列挙**](aws-cognito-unauthenticated-enum.md)
|
||||
- [**DocumentDB 認証なし列挙**](aws-documentdb-enum.md)
|
||||
- [**EC2 認証なし列挙**](aws-ec2-unauthenticated-enum.md)
|
||||
- [**Elasticsearch 認証なし列挙**](aws-elasticsearch-unauthenticated-enum.md)
|
||||
- [**IAM 認証なし列挙**](aws-iam-and-sts-unauthenticated-enum.md)
|
||||
- [**IoT 認証なしアクセス**](aws-iot-unauthenticated-enum.md)
|
||||
- [**Kinesis Video 認証なしアクセス**](aws-kinesis-video-unauthenticated-enum.md)
|
||||
- [**Media 認証なしアクセス**](aws-media-unauthenticated-enum.md)
|
||||
- [**MQ 認証なしアクセス**](aws-mq-unauthenticated-enum.md)
|
||||
- [**MSK 認証なしアクセス**](aws-msk-unauthenticated-enum.md)
|
||||
- [**RDS 認証なしアクセス**](aws-rds-unauthenticated-enum.md)
|
||||
- [**Redshift 認証なしアクセス**](aws-redshift-unauthenticated-enum.md)
|
||||
- [**SQS 認証なしアクセス**](aws-sqs-unauthenticated-enum.md)
|
||||
- [**S3 認証なしアクセス**](aws-s3-unauthenticated-enum.md)
|
||||
|
||||
## Cross Account Attacks
|
||||
## クロスアカウント攻撃
|
||||
|
||||
In the talk [**Breaking the Isolation: Cross-Account AWS Vulnerabilities**](https://www.youtube.com/watch?v=JfEFIcpJ2wk) it's presented how some services allow(ed) any AWS account accessing them because **AWS services without specifying accounts ID** were allowed.
|
||||
トークである [**隔離の破壊:クロスアカウント AWS 脆弱性**](https://www.youtube.com/watch?v=JfEFIcpJ2wk) では、いくつかのサービスが**アカウント ID を指定しない AWS サービス**が許可されていたため、任意の AWS アカウントがそれらにアクセスできることが示されています。
|
||||
|
||||
During the talk they specify several examples, such as S3 buckets **allowing cloudtrai**l (of **any AWS** account) to **write to them**:
|
||||
トーク中に、S3 バケットが**任意の AWS アカウント**の**cloudtrail**を**書き込むことを許可している**など、いくつかの例が示されています:
|
||||
|
||||
.png>)
|
||||
|
||||
Other services found vulnerable:
|
||||
他に見つかった脆弱なサービス:
|
||||
|
||||
- AWS Config
|
||||
- Serverless repository
|
||||
- Serverless リポジトリ
|
||||
|
||||
## Tools
|
||||
## ツール
|
||||
|
||||
- [**cloud_enum**](https://github.com/initstring/cloud_enum): Multi-cloud OSINT tool. **Find public resources** in AWS, Azure, and Google Cloud. Supported AWS services: Open / Protected S3 Buckets, awsapps (WorkMail, WorkDocs, Connect, etc.)
|
||||
- [**cloud_enum**](https://github.com/initstring/cloud_enum): マルチクラウド OSINT ツール。AWS、Azure、Google Cloud の**公開リソースを見つける**。サポートされている AWS サービス:オープン / 保護された S3 バケット、awsapps (WorkMail、WorkDocs、Connect など)
|
||||
|
||||
{{#include ../../../banners/hacktricks-training.md}}
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Reference in New Issue
Block a user