How I found AWS Secret Key and Access Key via Threat Intelligence.

Karthikeyan
Vault Infosec
Published in
2 min readJun 12, 2023

First and foremost, begin to comprehend the web application’s business process and assemble the tech stacks of the applications. I have included all of the subdomains of the specific company in the initial round of recon. Following the subdomain enumeration, a nuclei scan was performed on the subdomains to check for any vulnerabilities. Nmap was also used to discover open ports and the services that were using them. Apart from that, we attempted to take over a subdomain, but it was unsuccessful. Google Dorking and GitHub Dorking were then performed, and nothing sensitive was found. Post that looked up in search engines like Censys, Shodan, and Zoomeye.

Felt down can’t even find one thing

Then I started to manually inspect the website by checking the Inspect option in the developer tools to see if there was anything sensitive there. And finally, I found the AWS Access Key ID and Secret Access Key in a .js file.

After that, it configured AWS CLI with those keys to verify the keys were legitimate, and it listed out the S3 buckets it has access to.

This key has access to lots of s3 buckets

The issue is that private information like these keys shouldn’t be shared in publicly accessible files. In the .js files, we can locate some sensitive data. The key is to maintain optimism.

Hope this gives a piece of valuable information.

--

--