CloudFrunt is a tool for identifying misconfigured CloudFront domains.
Background
CloudFront is a Content Delivery Network (CDN) provided by Amazon Web Services (AWS). CloudFront users create "distributions" that serve content from specific sources (an S3 bucket, for example).
Each CloudFront distribution has a unique endpoint for users to point their DNS records to (ex. d111111abcdef8.cloudfront.net). All of the domains using a specific distribution need to be listed in the "Alternate Domain Names (CNAMEs)" field in the options for that distribution.
When a CloudFront endpoint receives a request, it does NOT automatically serve content from the corresponding distribution. Instead, CloudFront uses the HOST header of the request to determine which distribution to use. This means two things:
- If the HOST header does not match an entry in the "Alternate Domain Names (CNAMEs)" field of the intended distribution, the request will fail.
- Any other distribution that contains the specific domain in the HOST header will receive the request and respond to it normally.
This is what allows the domains to be hijacked. There are many cases where a CloudFront user fails to list all the necessary domains that might be received in the HOST header. For example:
- The domain "test.disloops.com" is a CNAME record that points to "disloops.com".
- The "disloops.com" domain is set up to use a CloudFront distribution.
- Because "test.disloops.com" was not added to the "Alternate Domain Names (CNAMEs)" field for the distribution, requests to "test.disloops.com" will fail.
- Another user can create a CloudFront distribution and add "test.disloops.com" to the "Alternate Domain Names (CNAMEs)" field to hijack the domain.
This means that the unique endpoint that CloudFront binds to a single distribution is effectively meaningless. A request to one specific CloudFront subdomain is not limited to the distribution it is associated with.
Installation
$ pip install boto3
$ pip install netaddr
$ pip install dnspython
$ git clone https://github.com/disloops/cloudfrunt.git
$ cd cloudfrunt
$ git clone https://github.com/darkoperator/dnsrecon.git
CloudFrunt expects the dnsrecon script to be cloned into a subdirectory called dnsrecon.Usage
cloudfrunt.py [-h] [-l TARGET_FILE] [-d DOMAINS] [-o ORIGIN] [-i ORIGIN_ID] [-s] [-N]
-h, --help Show this message and exit
-s, --save Save the results to results.txt
-N, --no-dns Do not use dnsrecon to expand scope
-l, --target-file TARGET_FILE File containing a list of domains (one per line)
-d, --domains DOMAINS Comma-separated list of domains to scan
-o, --origin ORIGIN Add vulnerable domains to new distributions with this origin
-i, --origin-id ORIGIN_ID The origin ID to use with new distributions
Example
$ python cloudfrunt.py -o cloudfrunt.com.s3-website-us-east-1.amazonaws.com -i S3-cloudfrunt -l list.txt
CloudFrunt v1.0.3
[+] Enumerating DNS entries for google.com
[-] No issues found for google.com
[+] Enumerating DNS entries for disloops.com
[+] Found CloudFront domain --> cdn.disloops.com
[+] Found CloudFront domain --> test.disloops.com
[-] Potentially misconfigured CloudFront domains:
[#] --> test.disloops.com
[+] Created new CloudFront distribution EXBC12DE3F45G
[+] Added test.disloops.com to CloudFront distribution EXBC12DE3F45G
More information
- Black Hat Hacker Tools
- Blackhat Hacker Tools
- Pentest Recon Tools
- Game Hacking
- Hacking Tools Windows
- Hacker Tools Free
- Hack Tools For Ubuntu
- Free Pentest Tools For Windows
- New Hack Tools
- Hacker Tools Windows
- Hacking Apps
- Hack Tools Pc
- Hacking Tools Windows 10
- Usb Pentest Tools
- Hack Tools For Pc
- Nsa Hack Tools
- How To Hack
- Hacker Search Tools
- Hacker Tools
- Hacker Tools For Pc
- Hacker Tool Kit
- Hacker Hardware Tools
- Hacking Tools Windows 10
- Pentest Tools Nmap
- Hacking App
- Hack And Tools
- Install Pentest Tools Ubuntu
- Hacking Tools
- Hack Tools Mac
- Hacking Tools For Windows 7
- Hackrf Tools
- Hacking Tools 2019
- How To Hack
- Hacker Tools List
- Hacking Tools 2019
- Hacking Tools Windows 10
- Hacking Tools Windows
- Hacking Tools Online
- Hacking Tools For Windows
- Hack Tools Download
- Easy Hack Tools
- Pentest Tools Framework
- Hacker Tools Software
- Hacker Tools Online
- Pentest Recon Tools
- Blackhat Hacker Tools
- Hack Tool Apk No Root
- Computer Hacker
- Hacker Tools For Windows
- Pentest Tools For Windows
- Pentest Tools Find Subdomains
- Hack Tools For Mac
- Hack Tools For Mac
- Hack Tools Github
- Hack Apps
- Hacker Tools For Ios
- Hack Tools For Ubuntu
- Hacking Tools For Windows 7
- Easy Hack Tools
- Hacker Tools Hardware
- Hacker Tools For Pc
- Pentest Automation Tools
- New Hacker Tools
- Pentest Tools Open Source
- Game Hacking
- Termux Hacking Tools 2019
- Hacker Hardware Tools
- Hacking Tools Mac
- Pentest Tools Github
- Hack Tools Github
- Hacker Tools For Windows
- Pentest Tools For Ubuntu
- Blackhat Hacker Tools
- Hacking Tools Pc
- Hacking Tools For Kali Linux
- What Is Hacking Tools
- Hacking Tools For Windows 7
- Hacking Tools And Software
- Pentest Tools For Windows
- Hacking Apps
- Hacker Tools Github
- Physical Pentest Tools
- Game Hacking
- Hacking Tools Windows
- Hacking Tools For Windows 7
- Hacking Tools Software
- Usb Pentest Tools
- Hacker Tools Apk Download
- Top Pentest Tools
- Beginner Hacker Tools
- Pentest Tools Website
- Blackhat Hacker Tools
- Hacking Tools For Games
- Hacking Tools For Windows
- Pentest Tools Nmap
- Best Pentesting Tools 2018
- Pentest Tools Github
- Hack Tools Pc
- Hacker Tools For Pc
- Pentest Tools Nmap
- Pentest Tools List
- Black Hat Hacker Tools
- Pentest Tools Find Subdomains
- Pentest Tools Download
- Pentest Tools Url Fuzzer
- Hacker Tools Apk Download
- Hacking Tools For Beginners
- Hacker Tools Mac
- Hacking Tools Software
- Physical Pentest Tools
- How To Make Hacking Tools
- Hacking Tools For Games
- Pentest Box Tools Download
- Pentest Tools Windows
- Hacking Tools For Beginners
- Hacking Tools For Mac
No hay comentarios:
Publicar un comentario