Programmerboy Pentesting Stuff
  • Welcome
  • Web Pentesting Stuff
    • Pentesting Port 80,443
      • FFUF Commands
      • Virtual Host Scanning
      • Javascript DeObfuscation
      • Pentesting JWT (JSON Web Tokens)
      • Pentesting Graphql
      • Pentesting Redis 6379
  • CMS Pentesting
    • Wordpress Pentesting
    • Jenkins
    • Grafana
  • Network Penetration Testing
    • Nmap Commands
    • 53 - Pentesting DNS
    • 88 - Pentesting Kerberos
    • 111 - Pentesting RPC
    • 389 - Pentesting LDAP
    • 445 - Pentesting SMB
    • 873 - Pentesting Rsync
    • 1433 - Pentesting MSSQL
    • 2049 - Pentesting NFS
    • 3389 Pentesting RDP
    • 3306 - Pentesting Mysql
    • 5000 - Pentesting Docker Registry
  • Active Directory Pentesting
    • Methodology
  • Password and Bruteforce Attacks
    • Hydra
    • Cewl
    • Making Custom Wordlists (Usernames)
    • JSON to txt Wordlist
  • Linux Privilege Escalation
    • Getting a Fully Interactive TTY Shell
    • Docker Container Escape
  • Windows Privilege Escalation
    • Tunneling and Pivoting
    • Methodology
  • Bug Bounty
    • Bug Bounty Methodology
    • XSS
    • SQL Injection
    • Command Injection
    • File Upload Pentesting
    • Local and Remote File Inclusion
    • Broken Authentication
    • Server Side Request Forgery (SSRF)
    • XML External Entity (XXE)
    • Server Side Template Injection (SSTI)
    • ReconFTW (six2dez)
    • JS Files
    • SignUp Page
  • CTFs
    • WEB
    • Regex Bypass
    • Grep & Regex & Find strings
  • Python Programs for Pentesting
    • Python Code Snippets
  • Certifications-Notes
    • CRTO & Cobalt Strike
  • Phishing and Real World Stuff
    • Email Spoofing
    • Attacking Office 365 & Exchange
  • Cloud Pentesting
    • Enumeration
  • CVEs
    • Simplehelp CVE-2024-57727
    • Next.js CVE-2025-29927
Powered by GitBook
On this page
  • AWSCLI Configuration
  • Getting Basic Information
  • List Groups
  • List Policies
  • List Group Policy
  • S3 Buckets
  • List s3 Buckets
  • Recursively Look at the S3 Buckets
  • Download Files From S3 Buckets
  • Describe-Instances
  • Describe DB Instances
  1. Cloud Pentesting

Enumeration

PreviousAttacking Office 365 & ExchangeNextSimplehelp CVE-2024-57727

Last updated 6 months ago

AWSCLI Configuration

We can configure Profile using awscli

aws configure --profile McDuck

Getting Basic Information

First Thing you need to do after setting the credentials is that you need to see your details and information

aws sts get-caller-identity --profile user1
aws iam get-user

List Groups

aws --profile user4 iam list-groups-for-user --user-name r_waterhouse

List Policies

aws --profile user4 iam list-group-policies --group-name cg-developers

List Group Policy

aws --profile user4 iam get-group-policy --group-name cg-developers --policy-name developer_policy

S3 Buckets

List s3 Buckets

aws s3 ls --profile McDuck

Recursively Look at the S3 Buckets

We can recursively see the S3 Buckets

aws s3 ls s3://cg-keystore-s3-bucket-rce-webapp --recursive --profile McDuck

Download Files From S3 Buckets

aws s3 cp s3://cg-keystore-s3-bucket-rce-webapp/cloudgoat . --profile McDuck

Describe-Instances

aws ec2 describe-instances --profile McDuck

Describe DB Instances

aws rds describe-db-instances --region us-east-1