βοΈ Automated Tools β
AWS environments can be complex, and manually assessing their security can be time-consuming and error-prone. Fortunately, several automated tools are available to help security professionals assess, monitor, and secure AWS environments effectively. Below, we discuss some of the most popular and powerful automated tools for AWS security.
π PACU β
PACU is an open-source tool designed for conducting security assessments and penetration tests in AWS environments. It allows security professionals to automate various attack techniques and assess the security posture of an AWS account.
Usage Example β
To start PACU, run the following command :
pacuOnce inside PACU, you can use various modules to perform specific tasks.
- Setting the
Initial User Access Key:
set_keys- Get the
Permissionsof the Currently Logged-In User :
exec iam__enum_permissions
whoami- Enumerate
EC2 Instancesand Get thePublic IP Addresses:
exec ec2__enum
data EC2- Enumerate
Privilege Escalation Permissionsand Exploit Them :
exec iam__privesc_scanβοΈ Cloud_enum β
Cloud_enum is an open-source tool for enumerating cloud resources in an AWS environment. It is particularly useful for discovering publicly exposed assets and services.
Usage Example β
cloud_enum -k BUCKET_NAME[+] Checking for S3 buckets
OPEN S3 BUCKET: http://**********.s3.amazonaws.com/
FILES:
->http://**********.s3.amazonaws.com/**********
->http://**********.s3.amazonaws.com/dev-server-ip.txt
->http://**********.s3.amazonaws.com/prod-data.txt
->http://**********.s3.amazonaws.com/staging-data.txtβοΈ ScoutSuite β
ScoutSuite is an open-source multi-cloud security auditing tool that supports AWS, Azure, and Google Cloud. It allows security professionals to assess the security posture of their cloud environments and identify potential security risks.
Usage Example β
To run ScoutSuite for an AWS environment, use the following command :
scout aws --access-key-id <AWS_ACCESS_KEY> --secret-access-key <AWS_SECRET_KEY>π¨ Cloudsplaining β
Cloudsplaining is an open-source tool for analyzing AWS IAM policies. It helps security professionals identify and mitigate risky permissions that could lead to privilege escalation or other security issues.
Usage Example β
To analyze IAM policies with Cloudsplaining, use the following command :
cloudsplaining scan --input-file <path_to_iam_policy_file>