Skip to content

S3 Bucket Detect

ID: s3-bucket

Severity: info

Author: gaurang

Tags: file,keys,token,bucket

id: s3-bucket
info:
name: S3 Bucket Detect
author: gaurang
severity: info
tags: file,keys,token,bucket
file:
- extensions:
- all
extractors:
- type: regex
regex:
- "[a-z0-9.-]+\\.s3\\.amazonaws\\.com"
- "[a-z0-9.-]+\\.s3-[a-z0-9-]\\.amazonaws\\.com"
- "[a-z0-9.-]+\\.s3-website[.-](eu|ap|us|ca|sa|cn)"
- "//s3\\.amazonaws\\.com/[a-z0-9._-]+"
- "//s3-[a-z0-9-]+\\.amazonaws\\.com/[a-z0-9._-]+"
# digest: 490a0046304402201b2b2d104b0c4ab79a6993f5202f96e40def8e42e78a7675efdc0a06e8bd7590022069c2ba2ae83a499673fd262e42ee08f74f7ee17d27335c14c04886fa6f40eb72:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "file/keys/s3-bucket.yaml"

View on Github