e7eb42eb87ff302421955679b4b78b9945bb75b5
this will give people some basic idea of using the dotenv file
Weird AAL
Weird AWS Attack Library (AAL)
Credentials
You will want to copy the env.sample file over to a .env file in your weirdAAL directory. Then place the relevant keys where applicable. Example:
weirdAAL$ cp env.sample .env
Examples
IAM
- iam_pwn.py -- given a ROOT or account with IAM access manipulate user access keys, MFA, console passwords or create a backdoor user
S3 Examples
- s3_list_bucket_contents.py -- list the contents of a single bucket
- s3_list_bucket_contents_fromfile.py --list the contents of a bucket from a list of buckets
- s3_list_buckets_for_acct.py -- show s3 buckets available to a particular key
- s3_list_buckets_and_contents.py -- list buckets AND contents (first 100) for a key
EC2
- ec2_review_encrypted_volumes.py -- review ec2 instances for encryption status -write out unencrypted ones to file (port of https://gist.github.com/cktricky/0fa3b13ca4306bcd1ec384e88eac3f55)
Description
Languages
Python
100%