Hacking Misconfigured AWS S3 Buckets: A Complete Guide
Hacking Misconfigured AWS S3 Buckets: A Complete Guide
Reward your researchers fairly – try our bug bounty calculator today!
Try our bug bounty calculator
Hacking misconfigured
AWS S3 buckets: A
complete guide
BY BLACKBIRD-EU SEPTEMBER 5, 2024
https://www.intigriti.com/researchers/blog/hacking-tools/hacking-misconfigured-aws-s3-buckets-a-complete-guide 1/17
03/02/2025, 18:01 Hacking misconfigured AWS S3 buckets: A complete guide
Solutions
Product
Table of contents
Resources
Finding & identifying AWS S3 buckets
1) Testing for misconfigured list permissions in AWS
Pricing
S3
2) Testing for misconfigured read permissions in AWS
Researchers
S3
3) Testing for misconfigured download permissions in
AWS demo
Request S3
4) Testing for misconfigured write permissions in
AWS S3
LEADERBOARD
5) Testing for read permissions on Access Control Lists
(ACLs)
CONTACT US
6) Testing for write permissions on Access Control
ABOUT US (ACLs)
Lists
7) Testing for missing file type restrictions
8) Testing for S3 versioning
Automated tools
Conclusion
https://www.intigriti.com/researchers/blog/hacking-tools/hacking-misconfigured-aws-s3-buckets-a-complete-guide 2/17
03/02/2025, 18:01 Hacking misconfigured AWS S3 buckets: A complete guide
Request demo
Examining HTTP responses:
One method is simply examining HTTP responses in your proxy
LEADERBOARD
intercepting tool. Often AWS S3 bucket references & links are included
in the HTTP response to load images or other files. Search for:
CONTACT US
ABOUT US
\.s3\.amazonaws\.com\/?
x-amz-bucket-region
x-amz-request-id
x-amz-id-2
https://www.intigriti.com/researchers/blog/hacking-tools/hacking-misconfigured-aws-s3-buckets-a-complete-guide 3/17
03/02/2025, 18:01 Hacking misconfigured AWS S3 buckets: A complete guide
Pricing
Dorking:
Request demo
Several popular search engines like Google, Bing, DuckDuckGo and
Brave Search support search syntaxis. You can take advantage of this
byLEADERBOARD
specifically looking for your company and browse through indexed
results.
CONTACT US
ABOUT US
site:.s3.amazonaws.com "company"
https://www.intigriti.com/researchers/blog/hacking-tools/hacking-misconfigured-aws-s3-buckets-a-complete-guide 4/17
03/02/2025, 18:01 Hacking misconfigured AWS S3 buckets: A complete guide
Bruteforcing:
You can also bruteforce common keywords your target may use as a
bucket name. Automated tools such as S3enum and cloud_enum can
help you enumerate AWS S3 buckets.
Pricing
Request demo
LEADERBOARD
CONTACT US
ABOUT US
cloud_enum preview
https://www.intigriti.com/researchers/blog/hacking-tools/hacking-misconfigured-aws-s3-buckets-a-complete-guide 5/17
03/02/2025, 18:01 Hacking misconfigured AWS S3 buckets: A complete guide
Request
aws demo
s3 ls s3://{BUCKET_NAME} --no-sign-request
ABOUT US
Example output
https://www.intigriti.com/researchers/blog/hacking-tools/hacking-misconfigured-aws-s3-buckets-a-complete-guide 6/17
03/02/2025, 18:01 Hacking misconfigured AWS S3 buckets: A complete guide
Make sure to replace the filename and bucket name in the command
LEADERBOARD
above.
CONTACT US
3)ABOUT
Testing
US for misconfigured download
permissions in AWS S3
To quickly check if we can download and read files, we can use the
cp subcommand:
Make sure to replace the filename and bucket name in the command
above.
https://www.intigriti.com/researchers/blog/hacking-tools/hacking-misconfigured-aws-s3-buckets-a-complete-guide 7/17
03/02/2025, 18:01 Hacking misconfigured AWS S3 buckets: A complete guide
Pricing
Make sure to use a filename with a non-trivial name to prevent any
disruption and replace the bucket name in the command above.
ThisRequest
operationdemo
can write and even overwrite a file, essentially deleting
the old one. If bucket versioning is not enabled, the changes are
permanent and permanent data loss is possible which can be
LEADERBOARD
catastrophic for a company.
CONTACT US
5)ABOUT
Testing
US for read permissions on Access
Control Lists (ACLs)
An Access Control List (ACL, commonly also referred to as ACP) is a
predefined scheme to help manage access controls on a specific S3
bucket or an object within an S3 bucket.
These ACLs can also have misconfigured access controls and allow
malicious actors to request them, essentially allowing them to take a
shortcut and easily enumerate any storage buckets or objects with
misconfigured access controls.
https://www.intigriti.com/researchers/blog/hacking-tools/hacking-misconfigured-aws-s3-buckets-a-complete-guide 8/17
03/02/2025, 18:01 Hacking misconfigured AWS S3 buckets: A complete guide
Make sure to replace the filename and bucket name in the command
LEADERBOARD
above.
CONTACT US
6)ABOUT
Testing
US for write permissions on Access
Control Lists (ACLs)
AWS also provides you the option to overwrite any Access Control List
(ACL) for an S3 storage bucket or object.
https://www.intigriti.com/researchers/blog/hacking-tools/hacking-misconfigured-aws-s3-buckets-a-complete-guide 9/17
03/02/2025, 18:01 Hacking misconfigured AWS S3 buckets: A complete guide
Make sure to replace the bucket name and the email in the command
above.
TIP! You do not have to always necessarily change an ACL to test for
write permissions if read permissions are enabled. You can simply
Pricing
check the "Grants" property in the response to a read operation
and verify if any unauthorized users are allowed to perform the
write operation!
Request demo
7) Testing for missing file type restrictions
AWS S3 buckets are often also used for storing public data such as
LEADERBOARD
profile images. And there are several ways developers are used to
CONTACT US
upload data to an AWS S3:
ABOUT US
1. Make the client upload the data to the company's API server,
perform validations on the uploaded file, and finally store it on
AWS S3 and return the public URL. The API server acts here as a
proxy between the client and the AWS S3 bucket API.
SIGN IN
2. Or make the client upload the data directly to AWS S3 by sending
a form upload request to the AWS S3 bucket API. The API will
return a link from which you can access the resource. To perform
validation, you'd have to declare additional policies to the
s3:PutObject for your AWS S3 bucket (this step is often
https://www.intigriti.com/researchers/blog/hacking-tools/hacking-misconfigured-aws-s3-buckets-a-complete-guide 10/17
03/02/2025, 18:01 Hacking misconfigured AWS S3 buckets: A complete guide
The reason why most developers select the latter approach over the
former is to decrease the load on their server. However, as mentioned
before, developers often forget to declare additional file type
restriction policies to further control what can be uploaded.
InPricing
this video by @gregxsunday, you could view another example of
how developers sometimes make mistakes when integrating AWS S3:
LEADERBOARD
CONTACT US
ABOUT US
https://www.intigriti.com/researchers/blog/hacking-tools/hacking-misconfigured-aws-s3-buckets-a-complete-guide 11/17
03/02/2025, 18:01 Hacking misconfigured AWS S3 buckets: A complete guide
Request
aws demo
s3api get-bucket-versioning --bucket {BUCKET_NAME} --no-sign-re
LEADERBOARD
Automated
CONTACT US
tools
Enumerating
ABOUT US and testing all your targets' S3 buckets individually can
be a tedious task, especially when your target makes use of several S3
buckets. Fortunately for us, there are several open-source tools that
we can make use of.
Here are a few open-source tools listed that can help with identifying
and exploiting AWS S3 buckets.
S3enum
https://www.intigriti.com/researchers/blog/hacking-tools/hacking-misconfigured-aws-s3-buckets-a-complete-guide 12/17
03/02/2025, 18:01 Hacking misconfigured AWS S3 buckets: A complete guide
https://github.com/koenrh/s3enum
cloud_enum
Pricing
https://github.com/initstring/cloud_enum
LazyS3
https://github.com/nahamsec/lazys3
LEADERBOARD
AWS Extender
CONTACT US
AWS Extender is a Burpsuite plugin (Professional edition only) to help
you test for
ABOUT USpermissions on AWS S3, Google Cloud Provider storage
buckets and Azure Storage Containers.
https://github.com/VirtueSecurity/aws-extender
Nuclei
https://github.com/projectdiscovery/nuclei
https://www.intigriti.com/researchers/blog/hacking-tools/hacking-misconfigured-aws-s3-buckets-a-complete-guide 13/17
03/02/2025, 18:01 Hacking misconfigured AWS S3 buckets: A complete guide
Conclusion
You've probably already come across an AWS S3 bucket, maybe even
a misconfigured one too, and if you ignored them before, we hope
this article shines some light on the most common security
misconfigurations present in this storage bucket service.
LEADERBOARD
CONTACT US
ABOUT US
Pricing
Request demo
7 Overlooked recon
techniques to find
more vulnerabilities
LEADERBOARD
JANUARY 13, 2025
CONTACT US
Continue
ABOUT US reading
Intigriti
About us
https://www.intigriti.com/researchers/blog/hacking-tools/hacking-misconfigured-aws-s3-buckets-a-complete-guide 15/17
03/02/2025, 18:01 Hacking misconfigured AWS S3 buckets: A complete guide
Manifesto
Corporate Social Responsibility
Resources
Legal information
Blog
Newsletter
Pricing
Careers
Companies
Request demo
How it works
Get in touch
LEADERBOARD Request demo
CONTACT US Customer stories
ABOUT US Bug bounty
Intigriti VDP
Pentest as a Service
Live hacking events
Pricing
Partner
Researchers
How it works
Public programs
https://www.intigriti.com/researchers/blog/hacking-tools/hacking-misconfigured-aws-s3-buckets-a-complete-guide 16/17
03/02/2025, 18:01 Hacking misconfigured AWS S3 buckets: A complete guide
Leaderboard
Learn to hack
Useful links
Knowledge base
Uptime & status
Pricing Cookie policy
Cookie settings
Trust center
Request demo Privacy statement
Terms & conditions
ABOUT US
https://www.intigriti.com/researchers/blog/hacking-tools/hacking-misconfigured-aws-s3-buckets-a-complete-guide 17/17