CloudFrunt is a tool for identifying misconfigured CloudFront domains.
Background
CloudFront is a Content Delivery Network (CDN) provided by Amazon Web Services (AWS). CloudFront users create "distributions" that serve content from specific sources (an S3 bucket, for example).
Each CloudFront distribution has a unique endpoint for users to point their DNS records to (ex. d111111abcdef8.cloudfront.net). All of the domains using a specific distribution need to be listed in the "Alternate Domain Names (CNAMEs)" field in the options for that distribution.
When a CloudFront endpoint receives a request, it does NOT automatically serve content from the corresponding distribution. Instead, CloudFront uses the HOST header of the request to determine which distribution to use. This means two things:
- If the HOST header does not match an entry in the "Alternate Domain Names (CNAMEs)" field of the intended distribution, the request will fail.
- Any other distribution that contains the specific domain in the HOST header will receive the request and respond to it normally.
This is what allows the domains to be hijacked. There are many cases where a CloudFront user fails to list all the necessary domains that might be received in the HOST header. For example:
- The domain "test.disloops.com" is a CNAME record that points to "disloops.com".
- The "disloops.com" domain is set up to use a CloudFront distribution.
- Because "test.disloops.com" was not added to the "Alternate Domain Names (CNAMEs)" field for the distribution, requests to "test.disloops.com" will fail.
- Another user can create a CloudFront distribution and add "test.disloops.com" to the "Alternate Domain Names (CNAMEs)" field to hijack the domain.
This means that the unique endpoint that CloudFront binds to a single distribution is effectively meaningless. A request to one specific CloudFront subdomain is not limited to the distribution it is associated with.
Installation
$ pip install boto3
$ pip install netaddr
$ pip install dnspython
$ git clone https://github.com/disloops/cloudfrunt.git
$ cd cloudfrunt
$ git clone https://github.com/darkoperator/dnsrecon.gitCloudFrunt expects the dnsrecon script to be cloned into a subdirectory called dnsrecon.Usage
cloudfrunt.py [-h] [-l TARGET_FILE] [-d DOMAINS] [-o ORIGIN] [-i ORIGIN_ID] [-s] [-N]
-h, --help Show this message and exit
-s, --save Save the results to results.txt
-N, --no-dns Do not use dnsrecon to expand scope
-l, --target-file TARGET_FILE File containing a list of domains (one per line)
-d, --domains DOMAINS Comma-separated list of domains to scan
-o, --origin ORIGIN Add vulnerable domains to new distributions with this origin
-i, --origin-id ORIGIN_ID The origin ID to use with new distributionsExample
$ python cloudfrunt.py -o cloudfrunt.com.s3-website-us-east-1.amazonaws.com -i S3-cloudfrunt -l list.txt
CloudFrunt v1.0.3
[+] Enumerating DNS entries for google.com
[-] No issues found for google.com
[+] Enumerating DNS entries for disloops.com
[+] Found CloudFront domain --> cdn.disloops.com
[+] Found CloudFront domain --> test.disloops.com
[-] Potentially misconfigured CloudFront domains:
[#] --> test.disloops.com
[+] Created new CloudFront distribution EXBC12DE3F45G
[+] Added test.disloops.com to CloudFront distribution EXBC12DE3F45GRelated posts
- Hack Tools For Pc
- Hacking Tools Hardware
- Pentest Tools Url Fuzzer
- Hacking Tools Free Download
- Hacker Tools Apk Download
- Blackhat Hacker Tools
- Hacker Tools 2020
- Pentest Tools Bluekeep
- Pentest Tools Kali Linux
- Hacking Tools 2019
- New Hack Tools
- Hack Tools Pc
- Pentest Tools Kali Linux
- Hacking Tools For Beginners
- Pentest Tools Port Scanner
- Hacking Tools Download
- Usb Pentest Tools
- Hacker Tools For Windows
- Hack Tools 2019
- Pentest Tools Website
- Hackrf Tools
- Hacker Tools 2020
- Hacking Tools And Software
- Hacker Tools
- Pentest Tools Url Fuzzer
- Hacker Tools List
- Hacking Tools
- Pentest Tools List
- Hacking Tools For Games
- How To Hack
- Hacking App
- New Hacker Tools
- Usb Pentest Tools
- Install Pentest Tools Ubuntu
- Hack Tools Online
- Hacking Tools Online
- Hacking Tools 2020
- Hacker Tools Mac
- Best Hacking Tools 2019
- Hacker
- Pentest Tools For Windows
- Install Pentest Tools Ubuntu
- Hack Tools 2019
- Hack Tools For Windows
- Pentest Tools Tcp Port Scanner
- Hacking Tools 2020
- Bluetooth Hacking Tools Kali
- Pentest Tools Free
- Hackrf Tools
- Hack Tool Apk No Root
- Pentest Tools Linux
- Hacking Tools Usb
- Nsa Hack Tools Download
- Hacker Tools Software
- Pentest Tools Find Subdomains
- Hacker Tools For Mac
- Easy Hack Tools
- Hacking Tools
- Pentest Tools Windows
- Blackhat Hacker Tools
- Hack Tools 2019
- Hacking Tools For Mac
- Hackrf Tools
- Hacking Tools Online
- Nsa Hacker Tools
- Hack Tools For Mac
- Github Hacking Tools
- Pentest Tools Free
- Tools Used For Hacking
- Kik Hack Tools
- Physical Pentest Tools
- Hacking Tools Download
- Hacking Tools For Beginners
- Hacker Tools Windows
- Hacker Techniques Tools And Incident Handling
- Hack And Tools
- Hack Tools For Windows
- Hacker Tool Kit
- Ethical Hacker Tools
- What Are Hacking Tools
- Hacking Tools Windows
- Kik Hack Tools
- Pentest Tools Open Source
- Blackhat Hacker Tools
- Pentest Tools Free
- What Are Hacking Tools
- Usb Pentest Tools
- Hacking Tools Download
- Hacking Tools For Games
- Hack Tools For Pc
- Pentest Tools Linux
- Pentest Tools Linux
- Hacker Tools For Mac
- Hacking Tools Windows
- Hack Tools Download
- Free Pentest Tools For Windows
- World No 1 Hacker Software
- Hacking Tools Kit
- Hacker Techniques Tools And Incident Handling
- How To Hack
- Pentest Tools Review
- Hacker Tools Online
- Hack Tools Pc
- Pentest Tools Kali Linux
- Hacker Tools Windows
- Wifi Hacker Tools For Windows
- Easy Hack Tools
- Kik Hack Tools
- Pentest Tools Nmap
- Hack And Tools
- Hacker Tools For Windows
- Hack Tools
- Pentest Tools List
- Growth Hacker Tools
- Hacker
- Hack Tools
- Android Hack Tools Github
- Beginner Hacker Tools
- Pentest Tools
- Hacking Tools For Kali Linux
- Hacking App
- Hacking Tools
- Tools For Hacker


No comments:
Post a Comment