Bucky is an automatic tool designed to discover S3 bucket misconfiguration, Bucky consists up of two modules Bucky firefox addon and Bucky backend engine. Bucky addon reads the source code of the webpages and uses Regular Expression(Regex) to match the S3 bucket used as Content Delivery Network(CDN) and sends it to the Bucky Backend engine. The backend engine receives the data from addon and checks if the S3 bucket is publicly writeable or not. Bucky automatically uploads a text file as Proof Of Concept(PoC) if the bucket is vulnerable.
Working
Bucky addon sends the details of s3 bucket name discovered from a user visited web pages to backend engine. It uses AWS PHP SDK to discover misconfiguration. Users can also check for S3 bucket misconfiguration manually. All the results from automatic and manuall check are populated to dashboard.
Installation
git clone https://github.com/smaranchand/bucky.git
cd bucky
Requirements: AWS Access Keys and PHP installation
Get AWS Access Keys: https://console.aws.amazon.com/iam/home?#/security_credentials
PHP installation: Install according to your OS, apt install php7.3 / brew install php7.3
Currently, Bucky addon is not published in the Firefox addon store; as soon as the addon will be published, the addon link will be provided.
For now, users can manually load the addon into the browser to do so
Add AWS Access keys:
cd bucky/
nano config.inc.php
Add your AWS Access Key ID and Secret Access Key. (On-Line 57 and 61)
Usage
To use Bucky, load the Bucky addon to the browser and start backend engine.
cd bucky/
chmod +x run.sh
./run.sh
The backend engine runs on http://127.0.0.1:13337
Browse websites, Bucky will discover S3 buckets automatically and will be reflected in the dashboard.
Visit the above address to access Bucky dashboard.
Screenshots
Running Bucky
Loading Addon
User Interface
All Buckets
Manual Check
POC By Bucky
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…
Embark on the journey of becoming a certified Red Team professional with our definitive guide.…
This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…
This took me like 4 days (+2 days for an update), but I got it…
MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…