Skip to content
This repository was archived by the owner on Apr 11, 2025. It is now read-only.
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 2 additions & 2 deletions s3.md
Original file line number Diff line number Diff line change
Expand Up @@ -43,8 +43,8 @@ amazonaws
A brute-force approach, possibly based on a word-list of common words along with specific words coming from the domain under testing, might be useful in identifying S3 buckets.
As described in the previous section, S3 buckets are identified by a predefined and predictable schema that can be useful for buckets identification. By means of an automatic tool it is possible to test multiple URLs in search of S3 buckets starting from a word-list.

In OWASP ZAP (v2.7.0) the fuzzer feature can be used for testing:
# With OWASP ZAP up and running, navigate to <code>https://s3.amazonaws.com/bucket</code> to generate a request to <code>https://s3.amazonaws.com/bucket</code> in the <code>Sites</code> panel;
In ZAP the fuzzer feature can be used for testing:
# With ZAP up and running, navigate to <code>https://s3.amazonaws.com/bucket</code> to generate a request to <code>https://s3.amazonaws.com/bucket</code> in the <code>Sites</code> panel;
# From the <code>Sites</code> panel, right click on the GET request and select <code>Attack -> Fuzz</code> to configure the fuzzer;
# Select the word <code>bucket</code> from the request to tell the fuzzer to fuzz in that location;
# Click <code>Add</code> and <code>Add</code> again to specify the payload the fuzzer will use;
Expand Down