more functions
This commit is contained in:
@@ -773,7 +773,6 @@ def brute_organizations_permissions(AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY):
|
|||||||
#NO functions to call without arguements
|
#NO functions to call without arguements
|
||||||
|
|
||||||
#http://boto3.readthedocs.io/en/latest/reference/services/polly.html
|
#http://boto3.readthedocs.io/en/latest/reference/services/polly.html
|
||||||
#TODO
|
|
||||||
def brute_polly_permissions(AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY):
|
def brute_polly_permissions(AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY):
|
||||||
print ("### Enumerating Polly Permissions ###")
|
print ("### Enumerating Polly Permissions ###")
|
||||||
tests = [('DescribeVoices', 'describe_voices', (), {} ),
|
tests = [('DescribeVoices', 'describe_voices', (), {} ),
|
||||||
@@ -798,20 +797,30 @@ def brute_rds_permissions(AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY):
|
|||||||
#http://boto3.readthedocs.io/en/latest/reference/services/redshift.html
|
#http://boto3.readthedocs.io/en/latest/reference/services/redshift.html
|
||||||
def brute_redshift_permissions(AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY):
|
def brute_redshift_permissions(AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY):
|
||||||
print ("### Enumerating Redshift Permissions ###")
|
print ("### Enumerating Redshift Permissions ###")
|
||||||
tests = [('DescribeClusters', 'describe_clusters', (), {}),
|
tests = [('DescribeClusters', 'describe_clusters', (), {} ),
|
||||||
('DescribeClusterSecurityGroups', 'describe_cluster_security_groups', (), {}),
|
('DescribeClusterSecurityGroups', 'describe_cluster_security_groups', (), {}) ,
|
||||||
('DescribeClusterSnapshots', 'describe_cluster_snapshots', (), {}),
|
('DescribeClusterSnapshots', 'describe_cluster_snapshots', (), {} ),
|
||||||
('DescribeClusterParameterGroup', 'describe_cluster_parameter_groups', (), {}),
|
('DescribeClusterParameterGroup', 'describe_cluster_parameter_groups', (), {} ),
|
||||||
('DescribeEvents', 'describe_events', (), {}),
|
('DescribeEvents', 'describe_events', (), {} ),
|
||||||
('DescribeHSMConfigurations', 'describe_hsm_configurations', (), {}),
|
('DescribeHSMConfigurations', 'describe_hsm_configurations', (), {} ),
|
||||||
]
|
]
|
||||||
return generic_permission_bruteforcer(AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY, 'redshift', tests)
|
return generic_permission_bruteforcer(AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY, 'redshift', tests)
|
||||||
|
|
||||||
#http://boto3.readthedocs.io/en/latest/reference/services/rekognition.html
|
#http://boto3.readthedocs.io/en/latest/reference/services/rekognition.html
|
||||||
#TODO
|
def brute_rekognition_permissions(AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY):
|
||||||
|
print ("### Enumerating Rekognition Permissions ###")
|
||||||
|
tests = [('ListCollections', 'list_collections', (), {} ),
|
||||||
|
]
|
||||||
|
return generic_permission_bruteforcer(AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY, 'rekognition', tests)
|
||||||
|
|
||||||
#http://boto3.readthedocs.io/en/latest/reference/services/resourcegroupstaggingapi.html
|
#http://boto3.readthedocs.io/en/latest/reference/services/resourcegroupstaggingapi.html
|
||||||
#TODO
|
#TODO
|
||||||
|
def brute_resourcegroupstaggingapi_permissions(AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY):
|
||||||
|
print ("### Enumerating Resource Groups Tagging API Permissions ###")
|
||||||
|
tests = [('GetResources', 'get_resources', (), {} ),
|
||||||
|
('GetResources', 'get_resources', (), {} ),
|
||||||
|
]
|
||||||
|
return generic_permission_bruteforcer(AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY, 'resourcegroupstaggingapi', tests)
|
||||||
|
|
||||||
#http://boto3.readthedocs.io/en/latest/reference/services/route53.html
|
#http://boto3.readthedocs.io/en/latest/reference/services/route53.html
|
||||||
def brute_route53_permissions(AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY):
|
def brute_route53_permissions(AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY):
|
||||||
|
|||||||
Reference in New Issue
Block a user