flaws.cloud Walkthrough | AWS Penetration Testing- Level 1

Level 1:

Let’s See what’s there on the bucket.

Just append s3.amazonaws.com after the domain

i.e., flaws.cloud.s3.amazonaws.com

Now, we can see some files on that s3 bucket, like robots.txt etc, but most importantly we can see some secret html file.

Let’s see what’s there on that html file.

For accessing that html file, we just need to append that file name after the s3 bucket link followed by a forward slash “/”.

i.e., http://flaws.cloud.s3.amazonaws.com/secret-dd02c7c.html

Bingo, Now let’s move to Level 2.




Security researcher, Blogger, Bug Bounty hunter

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

What is Edge Computing and Why is it Important for IoT?

The grid.studio manifesto

Linting Python Codes Better with Travis

Day 9 — Stop, take a minute!

Unit Testing: A Simplistic and Language-Agnostic Approach

Terraform: Creating Reusable Modules-Part 1

Prototyping in Software Engineering

The path to education through code

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Kapil Verma

Kapil Verma

Security researcher, Blogger, Bug Bounty hunter

More from Medium

Livestream setup

Facing Issues with Nuclei upgrade??

How contact forms can be exploited to conduct large scale phishing activity?

Bypassing IP Based Blocking with IP Rotate Burp Extension.