module

Cloud Lookup (and Bypass)

Disclosed
N/A
Created
2020-05-09

Description

This module can be useful if you need to test the security of your server and your
website behind a solution Cloud based. By discovering the origin IP address of the
targeted host.

More precisely, this module uses multiple data sources (in order ViewDNS.info, DNS enumeration
and Censys) to collect assigned (or have been assigned) IP addresses from the targeted site or domain
that uses the following:
* Cloudflare, Amazon CloudFront, ArvanCloud, Envoy Proxy, Fastly, Stackpath Fireblade,
Stackpath MaxCDN, Imperva Incapsula, InGen Security (BinarySec EasyWAF), KeyCDN, Microsoft AzureCDN,
Netlify and Sucuri.

Authors

mekhalleh (RAMELLA Sébastien)
Yvain

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use auxiliary/gather/cloud_lookup
msf auxiliary(cloud_lookup) > show actions
...actions...
msf auxiliary(cloud_lookup) > set ACTION < action-name >
msf auxiliary(cloud_lookup) > show options
...show and set options...
msf auxiliary(cloud_lookup) > run

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.