cyber-security-resources/cloud_resources
2024-04-08 17:20:53 -04:00
..
cloud_logging.md Create cloud_logging.md 2023-08-20 18:19:17 -04:00
enumerating_aws_boto3.md Create enumerating_aws_boto3.md 2023-08-20 22:44:31 -04:00
high_level_best_practices_pen_testing.md Create high_level_best_practices_pen_testing.md 2023-08-20 17:55:28 -04:00
questions_to_ask_your_provider.md Create questions_to_ask_your_provider.md 2024-04-08 17:20:53 -04:00
README.md Update README.md - Add OpenBuckets 2024-01-11 21:55:41 +05:30
s3_words.txt Update s3_words.txt 2023-08-20 22:27:25 -04:00

Cloud Security Resources

Vulnerables

Additional Tools

Azure

Enumeration Tools

Email and Username Enumeration

Cloud Infrastructure Enumeration

  • CloudBrute - Find a cloud infrastructure of a company
  • cloud_enum - Multi-cloud OSINT tool
  • Azucar - Security auditing tool for Azure environments

Azure Specific Enumeration

Information Gathering Tools

Azure Information Gathering

Multi-Cloud Security Auditing

  • ScoutSuite - Multi-cloud security auditing tool
  • Prowler - AWS and Azure security assessments

Lateral Movement Tools

Exploitation Tools

Azure Exploitation

Credential Attacks

  • MSOLSpray - Password spraying tool for Microsoft Online accounts
  • MFASweep - Check if MFA is enabled on multiple Microsoft Services Resources
  • adconnectdump - Dump Azure AD Connect credentials

Resources

Articles

Lists and Cheat Sheets

Lab Exercises

Talks and Videos

Public Cloud Governance

AWS Governance

URL Services

Service URL
s3 https://{user_provided}.s3.amazonaws.com
cloudfront https://{random_id}.cloudfront.net
ec2 ec2-{ip-seperated}.compute-1.amazonaws.com
es https://{user_provided}-{random_id}.{region}.es.amazonaws.com
elb http://{user_provided}-{random_id}.{region}.elb.amazonaws.com:80/443
elbv2 https://{user_provided}-{random_id}.{region}.elb.amazonaws.com
rds mysql://{user_provided}.{random_id}.{region}.rds.amazonaws.com:3306
rds postgres://{user_provided}.{random_id}.{region}.rds.amazonaws.com:5432
route 53 {user_provided}
execute-api https://{random_id}.execute-api.{region}.amazonaws.com/{user_provided}
cloudsearch https://doc-{user_provided}-{random_id}.{region}.cloudsearch.amazonaws.com
transfer sftp://s-{random_id}.server.transfer.{region}.amazonaws.com
iot mqtt://{random_id}.iot.{region}.amazonaws.com:8883
iot https://{random_id}.iot.{region}.amazonaws.com:8443
iot https://{random_id}.iot.{region}.amazonaws.com:443
mq https://b-{random_id}-{1,2}.mq.{region}.amazonaws.com:8162
mq ssl://b-{random_id}-{1,2}.mq.{region}.amazonaws.com:61617
kafka b-{1,2,3,4}.{user_provided}.{random_id}.c{1,2}.kafka.{region}.amazonaws.com
kafka {user_provided}.{random_id}.c{1,2}.kafka.useast-1.amazonaws.com
cloud9 https://{random_id}.vfs.cloud9.{region}.amazonaws.com
mediastore https://{random_id}.data.mediastore.{region}.amazonaws.com
kinesisvideo https://{random_id}.kinesisvideo.{region}.amazonaws.com
mediaconvert https://{random_id}.mediaconvert.{region}.amazonaws.com
mediapackage https://{random_id}.mediapackage.{region}.amazonaws.com/in/v1/{random_id}/channel

MultiCloud Governance

Kubernetes Operators

Container Tools

Cloud Security Standards

Learning

Blogs

Courses

Labs

Podcasts

Vulnerable By Design

Certifications

Projects

Alerting

Automated Security Assessment

Benchmarking

Data Loss Prevention

Firewall Management

Identity and Access Management

Incident Response

Spring

Threat modeling

  • ThreatModel for Amazon S3 - Library of all the attack scenarios on Amazon S3 and how to mitigate them, following a risk-based approach

Examples

Ex. Automated Security Assessment

Ex. Identity and Access Management

Ex. Logging

Ex. Web Application Firewall

Misc