Cloud Resources & Misconfigurations
Purpose
Identify cloud-hosted resources (e.g., S3 buckets, Azure blobs, GCP storage) that are misconfigured or unintentionally exposed. These often reveal sensitive data or access mechanisms if administrators have skipped proper permissions setup.
| Provider | Storage Type | Common Risk |
|---|---|---|
| AWS | S3 Buckets | Public access |
| Azure | Blob Storage | Anonymous access |
| GCP | Cloud Storage Buckets | Misconfigured IAM roles |
Identifying Cloud Resources
Step 1: Subdomain/IP Lookup
Misconfigured storage may resolve to provider-owned domains.
Command:
for i in $(cat subdomainlist); do host $i | grep "has address" | grep <website>.com | cut -d" " -f1,4; done
Replace “website” with the target website.
*.s3.website.com
*.blob.core.website.net
*.storage.website.com
This is what the results may look like after using the command provided above.
Passive Discovery Tools & Tactics
Google Dorks
Use advanced queries to find indexed cloud resources and files.
Examples:
site:s3.website.com inurl:website
site:blob.core.website.net intext:"confidential"
inurl:"website" filetype:pdf
Replace “website” with the target website.
Third-Party OSINT Sources
-
domain.glass – shows domains/subdomains and security status (e.g., Cloudflare protection).
-
GrayHatWarfare – searchable DB of open AWS/Azure/GCP buckets.
GrayHatWarfare Tip: Filter by file type to find documents, backups, private keys (*.pem, *.key), etc.
Naming Convention Clues
-
Companies often use internal abbreviations in infrastructure (e.g.,
ilf-assets,if-s3-backups). -
Brute-force or fuzz storage names with common patterns.
Examples:
website-backups
ilf-dev-static
website-archive
Common Cloud Data Risks
-
Exposed credentials (API keys, secrets,
.env,.pem) -
Downloadable SSH private keys
-
Public documents (contracts, HR data)
-
Misconfigured bucket permissions (read/list/write)
What to Record
-
Cloud service used
-
Domain/subdomain or endpoint
-
Type of data exposed
-
Associated risks (privilege escalation, lateral movement)
-
Security measures in place (e.g., Cloudflare)**