Cloud Resources
(Infrastructure Based Enumeration)
Last updated
(Infrastructure Based Enumeration)
Last updated
Even though cloud providers secure their infrastructure centrally, this does not mean that companies are free from vulnerabilities. The configurations made by the administrators may nevertheless make the company's cloud resources vulnerable. This often starts with the S3 buckets
(AWS), blobs
(Azure), cloud storage
(GCP), which can be accessed without authentication if configured incorrectly.
Often cloud storage is added to the DNS list when used for administrative purposes by other employees. This step makes it much easier for the employees to reach and manage them.
This info can also be found sometimes in source code.
Third-party providers such as and can also tell us a lot about the company's infrastructure.