AWS Report – Tool For Analyzing Amazon Resources

AWS Report is a tool for analyzing amazon resources, let us have a look at some of features;

  • Search iam users based on creation date
  • Search buckets public
  • Search security group with inbound rule for 0.0.0.0/0
  • Search elastic ip dissociated
  • Search volumes available
  • Search AMIs with permission public
  • Search internet gateways detached

Also Read – nmapAutomator : A Script That You Can Run In The Background

Install requirements

pip3 install –user -r requirements.txt

Environment variables

IAM_MAX_ACCESS_KEY_AGE default is 60 days.

Usage

Usage: aws_report.py [OPTIONS]

Options:
–s3 Search buckets public in s3
–iam Search iam users based on creation date
–sg Search security groups with inbound rule 0.0.0.0
–elasticip Search elastic IP not associated
–volumes Search volumes available
–ami Search AMIs with permission public
–owner TEXT Defines the owner of the resources to be found
–igw Search internet gateways detached
–region TEXT Defines the region of resources
–help Show this message and exit.

Examples

python3 aws_report.py –s3
python3 aws_report.py –iam
python3 aws_report.py –owner 296193067842 –ami

Running In Docker

docker run -it -e AWS_ACCESS_KEY_ID=you-access-key -e AWS_SECRET_ACCESS_KEY=you-secret-key gmdutra/aws-report –s3

R K

Recent Posts

Admin Panel Dorks : A Complete List of Google Dorks

Introduction Google Dorking is a technique where advanced search operators are used to uncover information…

22 hours ago

Log Analysis Fundamentals

Introduction In cybersecurity and IT operations, logging fundamentals form the backbone of monitoring, forensics, and…

2 days ago

Networking Devices 101: Understanding Routers, Switches, Hubs, and More

What is Networking? Networking brings together devices like computers, servers, routers, and switches so they…

3 days ago

Sock Puppets in OSINT: How to Build and Use Research Accounts

Introduction In the world of Open Source Intelligence (OSINT), anonymity and operational security (OPSEC) are…

3 days ago

What is SIEM? Complete Guide to Security Information and Event Management

Introduction As cyber threats grow more sophisticated, organizations need more than just firewalls and antivirus…

3 days ago

Website OSINT: Tools and Techniques for Reconnaissance

Introduction When it comes to cybersecurity and ethical hacking, one of the most effective ways…

4 days ago