Kali Linux

Poro : Scan Publicly Accessible Assets On Your AWS Cloud Environment

Poro is a tool to Scan for publicly accessible assets on your AWS environment

Services covered by this tool:

  • AWS ELB
  • API Gateway
  • S3 Buckets
  • RDS Databases
  • EC2 instances
  • Redshift Databases

Poro also check if a tag you specify is applied to identified public resources using –tag-key and –tag-value arguments.

Prequisites

  • AWS account with Read Only Access to services listed above.
  • Python 3.X
  • requests>=2.22.0
  • boto3>=1.20
  • botocore>= 1.20
  • enlighten>=1

Usage

  • Clone this repository
  • Configure your envionment with active credentials -> aws configure [sso]
  • Run python poro.py [-h] [–profile PROFILE] [–export FILE_NAME] [–verbose] [–tag-key KEY] [–tag-value VALUE]

optional arguments:
-h, –help show this help message and exit
–profile PROFILE Specify the aws profile (default is default)
–export FILE_NAME Specify the file name if you want to expport the results
–verbose, -v
–tag-key KEY Specify the tag key that you want to check if it exists in public resources
–tag-value VALUE Specify the tag value that you want to check if it exists in public resources

Poro prints the scanning results at the end of it’s execution in a json file if no export option is not specified.

R K

Recent Posts

How to Prevent Software Supply Chain Attacks

What is a Software Supply Chain Attack? A software supply chain attack occurs when a…

3 hours ago

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

1 week ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

2 weeks ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

2 weeks ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

2 weeks ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

2 weeks ago