Cloud Pen-testing Part -4

## Other AWS Tools

### WeirdAAL
https://github.com/carnal0wnage/weirdAAL

Run recon against all AWS services to enumerate access for a set of keys

```shell
python3 weirdAAL.py -m recon_all -t <name>

Pacu

AWS exploitation framework https://github.com/RhinoSecurityLabs/pacu

Install Pacu

sudo apt-get install python3-pip
git clone https://github.com/RhinoSecurityLabs/pacu
cd pacu
sudo bash install.sh

Import AWS keys for a specific profile

import_keys <profile name>

Detect if keys are honey token keys

Enumerate account information and permissions

Check for privilege escalation

Google Cloud Platform CLI Tool Cheatsheet

Authentication

Authentication with gcloud

List accounts available to gcloud

Account Information

Get account information

List organizations

Enumerate IAM policies set ORG-wide

Enumerate IAM policies set per project

List projects

Set a different project

Gives a list of all APIs that are enabled in the project

Get source code repos available to the user

Clone repo to home dir

Last updated

Was this helpful?