CloudFrunt is a tool for identifying misconfigured CloudFront domains.
Background
CloudFront is a Content Delivery Network (CDN) provided by Amazon Web Services (AWS). CloudFront users create "distributions" that serve content from specific sources (an S3 bucket, for example).
Each CloudFront distribution has a unique endpoint for users to point their DNS records to (ex. d111111abcdef8.cloudfront.net). All of the domains using a specific distribution need to be listed in the "Alternate Domain Names (CNAMEs)" field in the options for that distribution.
When a CloudFront endpoint receives a request, it does NOT automatically serve content from the corresponding distribution. Instead, CloudFront uses the HOST header of the request to determine which distribution to use. This means two things:
- If the HOST header does not match an entry in the "Alternate Domain Names (CNAMEs)" field of the intended distribution, the request will fail.
- Any other distribution that contains the specific domain in the HOST header will receive the request and respond to it normally.
This is what allows the domains to be hijacked. There are many cases where a CloudFront user fails to list all the necessary domains that might be received in the HOST header. For example:
- The domain "test.disloops.com" is a CNAME record that points to "disloops.com".
- The "disloops.com" domain is set up to use a CloudFront distribution.
- Because "test.disloops.com" was not added to the "Alternate Domain Names (CNAMEs)" field for the distribution, requests to "test.disloops.com" will fail.
- Another user can create a CloudFront distribution and add "test.disloops.com" to the "Alternate Domain Names (CNAMEs)" field to hijack the domain.
This means that the unique endpoint that CloudFront binds to a single distribution is effectively meaningless. A request to one specific CloudFront subdomain is not limited to the distribution it is associated with.
Installation
$ pip install boto3
$ pip install netaddr
$ pip install dnspython
$ git clone https://github.com/disloops/cloudfrunt.git
$ cd cloudfrunt
$ git clone https://github.com/darkoperator/dnsrecon.git
CloudFrunt expects the dnsrecon script to be cloned into a subdirectory called dnsrecon.Usage
cloudfrunt.py [-h] [-l TARGET_FILE] [-d DOMAINS] [-o ORIGIN] [-i ORIGIN_ID] [-s] [-N]
-h, --help Show this message and exit
-s, --save Save the results to results.txt
-N, --no-dns Do not use dnsrecon to expand scope
-l, --target-file TARGET_FILE File containing a list of domains (one per line)
-d, --domains DOMAINS Comma-separated list of domains to scan
-o, --origin ORIGIN Add vulnerable domains to new distributions with this origin
-i, --origin-id ORIGIN_ID The origin ID to use with new distributions
Example
$ python cloudfrunt.py -o cloudfrunt.com.s3-website-us-east-1.amazonaws.com -i S3-cloudfrunt -l list.txt
CloudFrunt v1.0.3
[+] Enumerating DNS entries for google.com
[-] No issues found for google.com
[+] Enumerating DNS entries for disloops.com
[+] Found CloudFront domain --> cdn.disloops.com
[+] Found CloudFront domain --> test.disloops.com
[-] Potentially misconfigured CloudFront domains:
[#] --> test.disloops.com
[+] Created new CloudFront distribution EXBC12DE3F45G
[+] Added test.disloops.com to CloudFront distribution EXBC12DE3F45G
More info
- Hack Tools Download
- Hacking Tools For Games
- Pentest Tools Apk
- Hacker
- Pentest Tools Github
- Underground Hacker Sites
- Pentest Reporting Tools
- Hack Tools For Mac
- Hack Apps
- Black Hat Hacker Tools
- New Hack Tools
- Hack Tools For Mac
- Hack Tools 2019
- Best Hacking Tools 2019
- Hacker Tools Apk
- Game Hacking
- Kik Hack Tools
- Wifi Hacker Tools For Windows
- Pentest Tools Open Source
- Pentest Tools Url Fuzzer
- Hacker Techniques Tools And Incident Handling
- Hack Tool Apk No Root
- Hack Tools For Mac
- Hacking Tools Windows 10
- Hacking Tools 2019
- Hacker Tool Kit
- Hacking Tools For Windows 7
- Pentest Tools For Windows
- Hacking Tools Mac
- Hacker
- Bluetooth Hacking Tools Kali
- Pentest Tools List
- Pentest Tools Tcp Port Scanner
- Hacking Tools For Mac
- How To Hack
- Hacking Tools Software
- Hacker Techniques Tools And Incident Handling
- Hacker Tools Free Download
- Game Hacking
- Hack Tools
- Android Hack Tools Github
- Nsa Hack Tools
- Kik Hack Tools
- Game Hacking
- Pentest Tools Android
- Pentest Tools Subdomain
- Beginner Hacker Tools
- What Are Hacking Tools
- World No 1 Hacker Software
- Tools Used For Hacking
- Usb Pentest Tools
- Growth Hacker Tools
- Usb Pentest Tools
- Growth Hacker Tools
- Hack Tools Pc
- Hacker
- Hack Tools For Windows
- Game Hacking
- Hacking Apps
- Underground Hacker Sites
- Hacker Tools Github
- Hacker Tools For Windows
- Pentest Tools Windows
- Pentest Tools
- Hacker Tools List
- Hacker Tools Online
- Pentest Tools Bluekeep
- Hacking Tools Hardware
- Ethical Hacker Tools
- Pentest Recon Tools
- Hacking Tools Usb
- Wifi Hacker Tools For Windows
- Hacking Tools For Windows
- Hak5 Tools
- Nsa Hack Tools
- New Hacker Tools
- Hackrf Tools
- Hack Tools Github
- Hack Tools For Games
- Hacker Hardware Tools
- Github Hacking Tools
- Hacker Tools Apk
- Hack Tools For Pc
- Hacker Hardware Tools
- Hack Tools For Games
- Pentest Tools Subdomain
- Hacking Tools For Mac
- Hack Tools For Mac
- Hacking Tools For Mac
- Physical Pentest Tools
- Bluetooth Hacking Tools Kali
- Hacking Tools Mac
- Pentest Tools Windows
- Physical Pentest Tools
- Hack Apps
- Nsa Hack Tools
- Hack Tools
- Pentest Tools Open Source
- Pentest Tools Port Scanner
- Pentest Tools For Android
- Hacking Tools Online
- How To Hack
- Pentest Tools Tcp Port Scanner
- Hacking Tools Online
- Pentest Tools Url Fuzzer
- Pentest Tools Github
- How To Install Pentest Tools In Ubuntu
- Pentest Tools Website
- Hack Tools Github
- Hacking Tools For Pc
- Hacker Techniques Tools And Incident Handling
- What Are Hacking Tools
- Hack Tools 2019
- Hacking Tools 2019
- Pentest Tools Free
- Pentest Tools For Windows
- Hacking Tools Software
- Hacking Tools Download
Ingen kommentarer:
Send en kommentar