CEH Practical Guide
Ctrlk
  • Certified Ethical Hacker (CEH v12 and CEH V13) Practical Guide: Complete Study Resources & Tips
  • Module 2. Footprinting and Reconnaissance
  • Module 3. Scanning Networks
  • Module 4. Enumeration
  • Module 5. Vulnerability Assessment
  • Module 6. System Hacking
  • Module 7. Malware Threats
  • Module 8. Sniffing
  • Module 9. Social Engineering
  • Module 10. Denial of Service
  • Module 11. Session Hijacking
  • Module 12. Evading IDS, antivirus and Honeypots
  • Module 13. Hacking Web Servers
  • Module 14. Hacking Web Applications
  • Module 15. SQL Injection
  • Module 16. Hacking Wireless Networks
  • Module 17. Hacking Mobile Platforms
  • Module 18. IoT and OT Hacking
  • Module 19. Cloud Computing
    • 1. Perform Reconnaissance on Azure
    • 2. S3 Bucket Enumeration
    • 3. Exploit S3 buckets
    • 4. Perform Privilege Escalation to Gain Higher Privileges
    • 5. Perform Vulnerability Assessment on Docker Images
  • Module 20. Cryptography
  • Tips for exams
  • Additional Resources
Powered by GitBook
On this page
  • 1. Enumerate S3 Buckets using Lazys3
  • 2. Enumerate S3 Buckets using S3 Scanner
  • 3. Enumerate s3 buckets using firefox extension

Was this helpful?

  1. Module 19. Cloud Computing

2. S3 Bucket Enumeration

Enumerate S3 Buckets

1. Enumerate S3 Buckets using Lazys3

LogoGitHub - nahamsec/lazys3GitHub
ruby lazys3.rb pakwheels

2. Enumerate S3 Buckets using S3 Scanner

LogoGitHub - sa7mon/S3Scanner: Scan for misconfigured S3 buckets across S3-compatible APIs!GitHub

3. Enumerate s3 buckets using firefox extension

s3bucketlist

LogoGitHub - AlecBlance/S3BucketList: Chrome and Firefox extension that lists Amazon S3 Buckets while browsingGitHub
LogoExam Prep & Training for CEH Practical (Unofficial Course)Udemy
Previous1. Perform Reconnaissance on AzureNext3. Exploit S3 buckets

Last updated 9 months ago

Was this helpful?