AWS_Loot: Pull secrets from an AWS environment
AWS_Loot
Searches an AWS environment looking for secrets, by enumerating environment variables and source code. This tool allows quick enumeration over large sets of AWS instances and services.
How it works
Awsloot works by going through EC2, Lambda, CodeBuilder instances and searching for high entropy strings. The EC2 Looter works by querying all available instance ID’s in all regions and requesting instance’s USERDATA where often developers leave secrets. The Lambda looter operates across regions as well. Lambada looters can search all available versions of a found function. It starts by searching the functions environment variables then downloads the source code and scans the source for secrets. The Codebuilder Looter works by searching for build instances and searching those builds for environment variables that might contain secrets.
Install
git clone https://github.com/seb1055/AWS-Loot.git
cd AWS-Loot
pip3 install -r requirements.txt
An AWS credential file (.aws/credentials) is required for authentication to the target environment
- Access Key
- Access Key Secret
Use
Source: https://github.com/seb1055/