2018-04-24 14:38:00 -04:00
2018-04-20 22:17:29 -04:00
2018-04-20 22:10:33 -04:00
2018-04-06 13:02:53 -10:00
2017-05-31 11:14:56 -04:00
2018-04-23 19:26:47 -04:00

Weird AAL

Weird AWS Attack Library (AAL)

Credentials

You will want to copy the env.sample file over to a .env file in your weirdAAL directory. Then place the relevant keys where applicable. Example:

weirdAAL$ cp env.sample .env

Examples

IAM

  • iam_pwn.py -- given a ROOT or account with IAM access manipulate user access keys, MFA, console passwords or create a backdoor user

S3 Examples

  • s3_list_bucket_contents.py -- list the contents of a single bucket
  • s3_list_bucket_contents_fromfile.py --list the contents of a bucket from a list of buckets
  • s3_list_buckets_for_acct.py -- show s3 buckets available to a particular key
  • s3_list_buckets_and_contents.py -- list buckets AND contents (first 100) for a key

EC2

Description
No description provided
Readme 392 KiB
Languages
Python 100%