Skip to content

Commit

Permalink
Merge pull request #22 from cfpadok/develop
Browse files Browse the repository at this point in the history
feat: add new tool for cognito aws pentesting
  • Loading branch information
carlospolop authored Nov 9, 2023
2 parents a7b19d1 + 5114276 commit 89c7285
Show file tree
Hide file tree
Showing 4 changed files with 72 additions and 0 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -20,6 +20,24 @@ For more info about Cognito check:
[aws-cognito-enum](../aws-services/aws-cognito-enum/)
{% endcontent-ref %}

### Tool for pentesting

[Cognito Scanner](https://github.com/padok-team/cognito-scanner) is a CLI tool in python that implements different attacks on Cognito including a privesc escalation.

#### Installation

```bash
$ pip install cognito-scanner
```

#### Usage

```bash
$ cognito-scanner --help
```

For more information check https://github.com/padok-team/cognito-scanner

### Gathering credentials from Identity Pool

As Cognito can grant **IAM role credentials** to both **authenticated** an **unauthenticated** **users**, if you locate the **Identity Pool ID** of an application (should be hardcoded on it) you can obtain new credentials and therefore privesc (inside an AWS account where you probably didn't even have any credential previously).
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -34,6 +34,24 @@ The learn what is a **Cognito Identity Pool check**:
[cognito-identity-pools.md](cognito-identity-pools.md)
{% endcontent-ref %}

## Tool for pentesting

[Cognito Scanner](https://github.com/padok-team/cognito-scanner) is a CLI tool in python that implements different attacks on Cognito including account enumeration and privesc escalation.

### Installation

```bash
$ pip install cognito-scanner
```

### Usage

```bash
$ cognito-scanner --help
```

For more information check https://github.com/padok-team/cognito-scanner

## Enumeration

{% code overflow="wrap" %}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -30,6 +30,24 @@ This is **useful to keep information of a user** (who will be always using the s

Moreover, the service **cognito-sync** is the service that allow to **manage and syncronize this information** (in the datasets, sending info in streams and SNSs msgs...).

### Tool for pentesting

[Cognito Scanner](https://github.com/padok-team/cognito-scanner) is a CLI tool in python that implements different attacks on Cognito including unwanted account creation and identity pool escalation.

#### Installation

```bash
$ pip install cognito-scanner
```

#### Usage

```bash
$ cognito-scanner --help
```

For more information check https://github.com/padok-team/cognito-scanner

## Accessing IAM Roles

### Unauthenticated
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -33,6 +33,24 @@ User pools provide:
* **User enumeration**: The registration functionality can be used to find usernames that already exists. This information can be useful for the brute-force attack.
* **Login brute-force**: In the [**Authentication**](cognito-user-pools.md#authentication) section you have all the **methods** that a user have to **login**, you could try to brute-force them **find valid credentials**.

### Tool for pentesting

[Cognito Scanner](https://github.com/padok-team/cognito-scanner) is a CLI tool in python that implements different attacks on Cognito including unwanted account creation and account oracle.

#### Installation

```bash
$ pip install cognito-scanner
```

#### Usage

```bash
$ cognito-scanner --help
```

For more information check https://github.com/padok-team/cognito-scanner

## Registration

User Pools allows by **default** to **register new users**.
Expand Down

0 comments on commit 89c7285

Please sign in to comment.