A PHP-based tool that brute forces AWS S3 bucket names and tests their permissions to identify accessible buckets and potential security misconfigurations.
Find AWS S3 buckets and test their permissions.
This tool is primarily used by security professionals and cloud auditors to discover existing AWS S3 buckets by brute forcing bucket names from wordlists and then testing their permissions such as ACL and write access. It helps identify misconfigured or publicly accessible buckets that could lead to data exposure or unauthorized access.
Requires AWS CLI installation and configuration for proper operation. Use caution with the --force-recurse option as it may generate a large number of permutations and cause extensive requests. The tool supports multiple cloud providers but is primarily designed for AWS S3 buckets. Appropriate permissions and ethical considerations should be observed when scanning buckets.
Install AWS CLI: apt-get install awscli
Configure AWS CLI: aws configure
For Google Cloud support, install gsutil as per https://cloud.google.com/storage/docs/gsutil_install
Clone the repository: git clone https://github.com/gwen001/s3-buckets-finder
php s3-buckets-bruteforcer.php --bucket gwen001-test002
Scan a single bucket named 'gwen001-test002' and test its permissions.
php s3-buckets-bruteforcer.php --bucket listing.txt --no-color --verbosity 1
Scan buckets listed in 'listing.txt' without colored output and suppress 'not found' messages.
php s3-buckets-bruteforcer.php --bucket listing1.txt --bucket listing2.txt --bucket listing3.txt --perform e --thread 10
Scan multiple bucket lists performing only existence checks with 10 concurrent threads.
php s3-buckets-bruteforcer.php --bucket listing.txt --prefix prefix.txt --suffix suffix1.txt --suffix2.txt --perform esw --thread 10
Scan buckets with permutations using prefixes and suffixes, performing existence, set ACL, and write tests with 10 threads.
php s3-buckets-bruteforcer.php --bucket listing.txt --region us-east-2 --rlevel 3
Scan buckets in the specified AWS region 'us-east-2' with recursion level 3.