The following code will attempt to enumerate operations that a given set of AWS AccessKeys can perform.
Usage: enumerate-iam.py [OPTIONS]
IAM Account Enumerator.
## AWS | |
# from http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-metadata.html#instancedata-data-categories | |
http://169.254.169.254/latest/user-data | |
http://169.254.169.254/latest/user-data/iam/security-credentials/[ROLE NAME] | |
http://169.254.169.254/latest/meta-data/iam/security-credentials/[ROLE NAME] | |
http://169.254.169.254/latest/meta-data/ami-id | |
http://169.254.169.254/latest/meta-data/reservation-id | |
http://169.254.169.254/latest/meta-data/hostname | |
http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key |
#!/usr/local/bin/python3 | |
import subprocess | |
import shlex | |
import json | |
# function to find the resolution of the input video file | |
def findVideoMetada(pathToInputVideo): | |
cmd = "ffprobe -v quiet -print_format json -show_streams" | |
args = shlex.split(cmd) | |
args.append(pathToInputVideo) |
Linux installation notes (tested under Ubuntu 14.04LTS/12.04LTS), assuming VirtualBox is already installed on host.
sudo apt-get install p7zip p7zip-full
sudo apt-get install nautilus-open-terminal
#!/bin/bash | |
#Script by OliverK | |
#Downloads _every_ wordlist in the packet storm security site. | |
#April 18th, 2011 | |
# Updated Oct , 2th, 2012 | |
mkdir common | |
cd common | |
wget --limit-rate 50k http://dl.packetstormsecurity.net/Crackers/wordlists/common-4 | |
wget --limit-rate 50k http://dl.packetstormsecurity.net/Crackers/wordlists/common-3 | |
wget --limit-rate 50k http://dl.packetstormsecurity.net/Crackers/wordlists/common-2 |