Professional

Anonymous Cloud, Configuration and Subdomain Takeover Scanner

Burp extension that performs a passive scan to identify cloud buckets and then test them for publicly accessible vulnerabilities.

The extension looks at all responses and will note:

  1. AWS S3 bucket URLs.
  2. Azure Storage container URLs.
  3. Google Storage container URLs.

Usage:

  1. Add the JAR as an extension in Burp.
  2. Add the appropriate targets to scope.
  3. Begin manually browsing and scanning the target.
  4. If you want to test for permissions issues that allow all authenticated AWS/GCP users, then add your personal AWS/GCP credentials, and click the "Set Configuration" button.
  5. If you want to check for potential subdomain takeover vulnerabilities, add API keys for Shodan and Censys (if you want to use both), in addition to a text file list of subdomains (if you want), check the subdomain takeover configuration box, and click the "Set Configuration" button.

For a full list of the features, please check out the GitHub link below.

Author

Author

codewatchorg

Version

Version

0.1.14

Rating

Rating

Popularity

Popularity

Last updated

Last updated

17 January 2023

Estimated system impact

Estimated system impact

Overall impact: Low

Memory
Low
CPU
Low
General
Low
Scanner
Low

You can install BApps directly within Burp, via the BApp Store feature in the Burp Extender tool. You can also download them from here, for offline installation into Burp.

You can view the source code for all BApp Store extensions on our GitHub page.

Follow @BApp_Store on Twitter to receive notifications of all BApp releases and updates.

Please note that extensions are written by third party users of Burp, and PortSwigger Web Security makes no warranty about their quality or usefulness for any particular purpose.

Go back to BappStore

Note:

Please note that extensions are written by third party users of Burp, and PortSwigger Web Security makes no warranty about their quality or usefulness for any particular purpose.