神兵利器 - ThunderCloud云漏洞扫描

admin 2023年3月30日10:55:08评论55 views字数 2032阅读6分46秒阅读模式
  • 项目地址:https://github.com/Rnalter/ThunderCloud.git
python3 tc.py -h
          _______ _                     _            _____ _                 _         |__   __| |                   | |          / ____| |               | |            | |  | |__  _   _ _ __   __| | ___ _ __| |    | | ___  _   _  __| |            | |  | '_ | | | | '_  / _` |/ _  '__| |    | |/ _ | | | |/ _` |            | |  | | | | |_| | | | | (_| |  __/ |  | |____| | (_) | |_| | (_| |            _/  |_| |_|__,_|_| |_|__,_|___|_|   _____|_|___/ __,_|__,_|

usage: tc.py [-h] [-ce COGNITO_ENDPOINT] [-reg REGION] [-accid AWS_ACCOUNT_ID] [-aws_key AWS_ACCESS_KEY] [-aws_secret AWS_SECRET_KEY] [-bdrole BACKDOOR_ROLE] [-sso SSO_URL] [-enum_roles ENUMERATE_ROLES] [-s3 S3_BUCKET_NAME]             [-conn_string CONNECTION_STRING] [-blob BLOB] [-shared_access_key SHARED_ACCESS_KEY]
Attack modules of cloud AWS
optional arguments:  -h, --help            show this help message and exit  -ce COGNITO_ENDPOINT, --cognito_endpoint COGNITO_ENDPOINT                        to verify if cognito endpoint is vulnerable and to extract credentials  -reg REGION, --region REGION                        AWS region of the resource  -accid AWS_ACCOUNT_ID, --aws_account_id AWS_ACCOUNT_ID                        AWS account of the victim  -aws_key AWS_ACCESS_KEY, --aws_access_key AWS_ACCESS_KEY                        AWS access keys of the victim account  -aws_secret AWS_SECRET_KEY, --aws_secret_key AWS_SECRET_KEY                        AWS secret key of the victim account  -bdrole BACKDOOR_ROLE, --backdoor_role BACKDOOR_ROLE                        Name of the backdoor role in victim role  -sso SSO_URL, --sso_url SSO_URL                        AWS SSO URL to phish for AWS credentials  -enum_roles ENUMERATE_ROLES, --enumerate_roles ENUMERATE_ROLES                        To enumerate and assume account roles in victim AWS roles  -s3 S3_BUCKET_NAME, --s3_bucket_name S3_BUCKET_NAME                        Execute upload attack on S3 bucket  -conn_string CONNECTION_STRING, --connection_string CONNECTION_STRING                        Azure Shared Access key for readingservicebus/queues/blobs etc  -blob BLOB, --blob BLOB                        Azure blob enumeration  -shared_access_key SHARED_ACCESS_KEY, --shared_access_key SHARED_ACCESS_KEY                        Azure shared key

 

神兵利器 - ThunderCloud云漏洞扫描

 

- 获取项目 `git clone https://github.com/Rnalter/ThunderCloud.git && cd ThunderCloud/`    - 安装[virtualenv](https://virtualenv.pypa.io/en/latest/) `pip install virtualenv` - 创建一个Python 3.6本地环境 `virtualenv -p python3.6 venv` - 激活虚拟环境 `source venv/bin/activate` - 安装项目的依赖性 `pip install -r requirements.txt` - 通过`python tc.py --help`运行该工具

 

使用

python3 tc.py -sso <sso_url> --region <region>python3 tc.py -ce <cognito_endpoint> --region <region>

 

原文始发于微信公众号(Khan安全攻防实验室):神兵利器 - ThunderCloud云漏洞扫描

  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2023年3月30日10:55:08
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   神兵利器 - ThunderCloud云漏洞扫描https://cn-sec.com/archives/1638901.html

发表评论

匿名网友 填写信息