𝗔𝗪𝗦 𝗢𝗦𝗜𝗡𝗧 𝗯𝘆 𝗗𝗼𝗿𝗸𝗶𝗻𝗴 🎩
=Shodan Dorks
html:”AWS_ACCESS_KEY_ID”
html:”AWS_SECRET_ACCESS_KEY”
html:”AWS_SESSION_TOKEN”
title:”AWS S3 Explorer”
html:”AWS Elastic Beanstalk overview”
html:”OpenSearch Dashboards”
“X-Amz-Server-Side-Encryption”
title:”EC2 Instance Information”
http.title:”Amazon Cognito Developer Authentication Sample”
“Server: EC2ws”
title:”AWS X-Ray Sample Application”
html:”Amazon EC2 Status”
html:”AWS EC2 Auto Scaling Lab”
html:”istBucketResult”
=Search Engine Dorks
site:.s3.amazonaws.com “Company”
site:http://s3.amazonaws.com intitle:index.of.bucket “”
site:s3.amazonaws.com “index of /” s3
site:amazonaws.com filetype:xls password
inurl:gitlab “AWS_SECRET_KEY”
inurl:pastebin “AWS_ACCESS_KEY”
inurl:s3.amazonaws.com intitle:”AWS S3 Explorer”
=Github Dorks
Key:amazon_secret_access_key
amazonaws
aws_access
aws_access_key_id
aws_bucket aws_key
aws_secret
aws_secret_key
aws_token
bucket_password
bucketeer_aws_access_key_id
bucketeer_aws_secret_access_key
cache_s3_secret_key
cloud_watch_aws_access_key
filename:credentials
aws_access_key_id
filename:s3cfg
lottie_s3_api_key
lottie_s3_secret_key
rds.amazonaws.com password
s3_access_key
s3_access_key_id
s3_key s3_key_app_logs
s3_key_assets
s3_secret_key
sandbox_aws_access_key_id
sandbox_aws_secret_access_key
secret_key
eureka.aws
secretkey
filename:.bash_profile
aws
filename:.s3cfg
#aws #cloudsecurity #osint #dorking #cloud_dorking
