Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/7WaySecurity/cloud_osint
A repository with informtion related to Cloud Osint
https://github.com/7WaySecurity/cloud_osint
Last synced: 3 months ago
JSON representation
A repository with informtion related to Cloud Osint
- Host: GitHub
- URL: https://github.com/7WaySecurity/cloud_osint
- Owner: 7WaySecurity
- License: mit
- Created: 2022-05-04T15:40:17.000Z (over 2 years ago)
- Default Branch: main
- Last Pushed: 2024-02-23T15:55:49.000Z (9 months ago)
- Last Synced: 2024-04-09T04:17:15.978Z (7 months ago)
- Size: 54.7 KB
- Stars: 64
- Watchers: 2
- Forks: 5
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- Offensive-OSINT-Tools - Cloud OSINT - Repository with information related to Cloud Osint ([↑](-table-of-contents) Usefull links / Tools)
README
# **Cloud OSINT**
A repository with information related to different resources, tools, and techniques related to Cloud OSINT
## **Cloud Infrastructure**
### **Azure Storage**
* Blob storage: http://*mystorageaccount*.blob.core.windows.net
* Table storage: http://*mystorageaccount*.table.core.windows.net
* Queue storage: http://*mystorageaccount*.queue.core.windows.net
* Azure Files: http://*mystorageaccount*.file.core.windows.net
* Database: http://*mystorageaccount*.database.windows.net### **AWS S3 Buckets**
* https://[bucketname].s3.amazonaws.com
* https://s3-[region].amazonaws/[bucketname]/
* https://[bucketname].s3-website-[region].amazonaws.com/### **GCP Technologies**
* Technologies Cheatsheet - https://googlecloudcheatsheet.withgoogle.com
* GCP Regions and Zones - https://cloud.google.com/compute/docs/regions-zones## **Google dorks**
### **Azure**
```
* site:blob.core.windows.net “keyword”
* site:"blob.core.windows.net" and intext:"CONFIDENTIAL"
* site:*.core.windows.net intext:"TLP:RED"
* site:*.core.windows.net
* site:*.core.windows.net +blob
* site:*.core.windows.net +files -web -blob
* site:*.core.windows.net -web
* site:*.core.windows.net -web -blob -files
* site:*.core.windows.net inurl:dsts.dsts
* site:*.core.windows.net inurl:"term" -web
* site:*.blob.core.windows.net ext:xls | ext:xlsx (login | password | username)
* intext:connectionstring blob filetype:config
* intext:accountkey windows.net filetype:xml
* intext:storageaccountkey windows.net filetype:txt
```
### **AWS*** site:"s3-external-1.amazonaws.com" and intext:CONFIDENTIAL
* site:"s3.amazonaws.com" and intext:CONFIDENTIAL
* site:"s3.dualstack.us-east-1.amazonaws.com" and intext:CONFIDENTIAL
* site:"s3-external-1.amazonaws.com" and intext:"TOP SECRET"
* site:"s3.amazonaws.com" and intext:"tlp:red"
* site:"s3.amazonaws.com" and intext:"tlp:amber"
* site:s3.amazonaws.com example
* site:s3.amazonaws.com example.com
* site:s3.amazonaws.com example-com
* site:s3.amazonaws.com com.example
* site:s3.amazonaws.com com-example
* site:s3.amazonaws.com filetype:xls password
* site:http://s3.amazonaws.com intitle:index.of.bucket
* site:http://amazonaws.com inurl:".s3.amazonaws.com/"
* s3 site:amazonaws.com filetype:log
* site:http://trello.com "aws.amazon.com" "password"### **Google Cloud**
* site:googleapis.com +commondatastorage
* site:.firebaseio.com "COMPANY NAME"
* inurl:bc.googleusercontent.com intitle:index of
* site:storage.googleapis.com
* Bucket list for a project - site:console.cloud.google.com/storage/browser
* Details for an object - site:console.cloud.google.com/storage/browser/_details
* site:firebasestorage.googleapis.com## **Shodan Dorks**
### **Filter Reference**
* cloud.provider
* cloud.region
* cloud.service### **Azure**
* cloud.service:"azureCloud"
* cloud.service:"azureCloud" country:GB,US http.title:"swagger" http.status:200 - API Documentation
* cloud.service:"azureCloud" http.status:200 country:GB,US -http.title:"Your Azure Function App is up and running." -http.title"IIS Windows Server“ - Web Services that are not default splash pages
* cloud.provider:"Azure" country:GB,US http.status:200 http.title:"Index of /" ssl:true - Web Apps with directory listings enabled and SSL
* cloud.provider:"Azure" country:GB,US http.status:200 http.title:"Index of /" - Web Apps with directory listings enabled
* cloud.provider:"Azure" hostname:"cloudapp.net" http.status:200,302 - Cloud Apps
* cloud.service:"AzureCloud" http.status:200 http.title:"api" - APIs### **Amazon**
* cloud.provider:"Amazon"
* cloud.provider:"Amazon" http.status:200,302 http.title:"Index of /"### Other Cloud Services
* site:vps-*.vps.ovh.net
## **Web Cloud OSINT Resources**
1. Search Open Buckets - https://buckets.grayhatwarfare.com/
2. Search cloud storage and buckets in different cloud providers - https://cse.google.com/cse?cx=002972716746423218710:veac6ui3rio#gsc.tab=0&gsc.q=
3. FullHunt - https://fullhunt.io/search?query=is_cloud%3Atrue+*domain*
4. Comand to download the results of URLs and buckets that contain a specific word and the file is .docx, xlsx and pdf - curl "https://buckets.grayhatwarfare.com/api/v1/files/[WORD TO SEARCH]?access_token=[access_token]&extensions=docx,xlsx,pdf"
5. Azure Tenant Information including subdomains and configuration - https://aadinternals.com/osint/
6. Misconfigured servers containing sensitive data, including Azure Blob Storage, Amazon AWS S3 Buckets, and Google Buckets - https://socradar.io/labs/bluebleed
7. Cloud and other services key exposure - https://forager.trufflesecurity.com/explore## **Cloud OSINT Tools**
1. CloudEnum - https://github.com/initstring/cloud_enum
2. S3 Browser - https://s3browser.com - This is not properly a tool for OSINT tasks but is a Windows client for Amazon S3 and Amazon CloudFront that could help to browse some files.## **Domain Identification**
1. https://spyse.com/tools/subdomain-finder domain and subdomain enumeration
2. https://crt.sh Finding domains and subdomains by SSL certificates through certificate transparency
3. https://dnsdumpster.com/ domain and subdomain enumeration
4. https://osint.sh/subdomain/ domain and subdomain enumeration
5. https://search.censys.io/?q= queries by domain, host, SSL certificate, among others
6. https://www.zoomeye.org/ domains and host exposed on the internet similar to Shodan
7. https://osint.sh/subdomain/ find subdomains
8. https://osint.sh/dnshistory/ History of a DNS record## **Help to create your own dorks**
1. https://dorksearch.com/
2. https://www.dorkgpt.com/ dorks with chatgpt## **Others**
1. https://www.dedigger.com/# find exposed files in Google Drive, try search terms: AWS, azure, gcp, etc.