Skip to content

Subdomain takeover AWS S3

ID: aws-redirect

Severity: info

Author: manikanta a.k.a @secureitmania

Tags: aws,takeover,misconfig

id: aws-redirect
info:
name: Subdomain takeover AWS S3
author: manikanta a.k.a @secureitmania
severity: info
reference:
- https://link.medium.com/fgXKJHR9P7
metadata:
max-request: 1
tags: aws,takeover,misconfig
http:
- method: GET
path:
- '{{BaseURL}}'
redirects: false
matchers-condition: and
matchers:
- type: status
status:
- 307
- type: word
words:
- 'Location: https://aws.amazon.com/s3/'
part: header
# digest: 4b0a00483046022100c1eca5cbb263dabe75222e271c1d8c1f265f82983b04a51426d622258f80e855022100dd7ef48e602047f74e419bb2818dcbe10abb9548bb2d4f6053a840de37df8b23:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/misconfiguration/aws/aws-redirect.yaml"

View on Github