Cloud Pen-testing Part -4
## Other AWS Tools
### WeirdAAL
https://github.com/carnal0wnage/weirdAAL
Run recon against all AWS services to enumerate access for a set of keys
```shell
python3 weirdAAL.py -m recon_all -t <name>Pacu
AWS exploitation framework https://github.com/RhinoSecurityLabs/pacu
Install Pacu
sudo apt-get install python3-pip
git clone https://github.com/RhinoSecurityLabs/pacu
cd pacu
sudo bash install.shImport AWS keys for a specific profile
import_keys <profile name>Detect if keys are honey token keys
Enumerate account information and permissions
Check for privilege escalation
Google Cloud Platform CLI Tool Cheatsheet
Authentication
Authentication with gcloud
List accounts available to gcloud
Account Information
Get account information
List organizations
Enumerate IAM policies set ORG-wide
Enumerate IAM policies set per project
List projects
Set a different project
Gives a list of all APIs that are enabled in the project
Get source code repos available to the user
Clone repo to home dir
Last updated
Was this helpful?