goGetBucket - AWS S3 Bucket discovery through alterations and permutations.

goGetBucket – AWS S3 Bucket discovery through alterations and permutations.

goGetBucket is A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain.

When performing a recon on a domain – understanding assets they own is very important. AWS S3 bucket permissions have been confused time and time again, and have allowed for the exposure of sensitive material.

What this tool does, is enumerate S3 bucket names using common patterns I have identified during my time bug hunting and pentesting. Permutations are supported on a root domain name using a custom wordlist. I highly recommend the one packaged within AltDNS.

goGetBucket

The following information about every bucket found to exist will be returned:
+ List Permission
+ Write Permission
+ Region the Bucket exists in
+ If the bucket has all access disabled

Installation:
go get -u github.com/glen-mac/goGetBucket

Source: https://github.com/glen-mac